the model protects unauthorized modification of data
stored in public storages? How it preserves the con-
sistency of data stored in public and private storages
when the failure of the connection to a cloud storage
server occurs? These are popular questions but their
solutions are not trivial.
With respect to data confidentiality of the model,
we are expanding it to other relational database man-
agement systems, such as MySQL, PostgreSQL, Or-
acle, and BD2. We also plan to evaluate the security
level and performance of the proposed architecture.
ACKNOWLEDGEMENTS
This work was partially sponsored by the Grant-in-
Aid for Scientific Research (15H02685) from the
Japan Society for the Promotion of Science (JSPS).
REFERENCES
Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H.,
Kenthapadi, K., Motwani, R., Srivastava, U., Thomas,
D., and Xu, Y. (2005). Two can keep a secret: A dis-
tributed architecture for secure database services. In
2nd Biennial Conference on Innovative Data Systems
Research (CIDR 2005).
Bessani, A., Correia, M., Quaresma, B., Andr’e, F., and
Sousa, P. (2011). DEPSKY: Dependable and secure
storage in a cloud-of-clouds. In 6th Conference on
Computer Systems (EuroSys’11), pages 31–46.
Catteddu, D. and Hogben, G. (2009). Cloud computing:
Benefits, risks and recommendations for information
security. Technical report.
Ciriani, V., di Vimercati, S. D. C., Foresti, S., Jajodia, S.,
Paraboschi, S., and Samarati, P. (2011). Selective data
outsourcing for enforcing privacy. Journal of Com-
puter Security, 19(3):531–566.
Fernandes, D. A., Soares, L. F., ao V. Gomes, J., Freire,
M. M., and In
´
acio, P. R. (2014). Security issues in
cloud environments: A survey. International Journal
of Information Security, 13(2):113–170.
Ferrari, E. (2009). Database as a service: Challenges and
solutions for privacy and security. In Asia-Pacific Ser-
vices Computing Conference (APSCC 2009), pages
46–51.
Ferretti, L., Colajanni, M., Marchetti, M., and Scaruffi,
A. E. (2013). Transparent access on encrypted data
distributed over multiple cloud infrastructures. In
4th International Conference on Cloud Computing,
GRIDs, and Virtualization, pages 201–207.
Gentry, C. (2009). Fully homomorphic encryption using
ideal lattices. In 41st Annual ACM Symposium on The-
ory of Computing (STOC’09), pages 169–178.
Gomathisankaran, M., Tyagi, A., and Namuduri, K. (2011).
HORNS: A homomorphic encryption scheme for
cloud computing using residue number system. In
45th Annual Conference on Information Sciences and
Systems (CISS), pages 1–5.
Hacig
¨
um
¨
us, H., Iyer, B., and Mehrotra, S. (2002). Providing
database as a service. In 18th International Confer-
ence on Data Engineering (ICDE’02), pages 29–38.
Hashizume, K., Rosado, D. G., Fernndez-Medina, E., and
Fernandez, E. B. (2013). An analysis of security is-
sues for cloud computing. Journal of Internet Services
and Applications, 4(1):1–13.
Jammalamadaka, R. C., Gamboni, R., Mehrotra, S., Sea-
mons, K. E., and Venkatasubramanian, N. (2008).
iDataGuard: Middleware providing a secure network
drive interface to untrusted internet data storage. In
11th International Conference on Extending Database
Technology (EDBT’08), pages 36–41.
Jansen, W. and Grance, T. (2011). Guidelines on security
and privacy in public cloud computing. Technical Re-
port SP 800-144.
Mell, P. and Grance, T. (2011). The nist definition of cloud
computing. Technical Report SP 800-145.
Menychtas, A., Santzaridou, C., Kousiouris, G., Var-
varigou, T., Orue-Echevarria, L., Alonso, J., Gorrono-
goitia, J., Bruneliere, H., Strauss, O., Senkova, T., Pel-
lens, B., and Stuer, P. (2013). ARTIST methodology
and framework: A novel approach for the migration
of legacy software on the cloud. In 15th International
Symposium on Symbolic and Numeric Algorithms for
Scientific Computing (SYNASC), pages 424–431.
Ren, K., Wang, C., and Wang, Q. (2012). Security chal-
lenges for the public cloud. IEEE Internet Computing,
16(1):69–73.
Subashini, S. and Kavitha, V. (2011). A survey on security
issues in service delivery models of cloud comput-
ing. Journal of Networkand Computer Applications,
34(1):1–11.
Subashini, S. and Kavitha, V. (2012). A metadata based
storage model for securing data in cloud environment.
American Journal of Applied Sciences, 9(9):1407–
1414.
Tak, B. C. and Tang, C. (2014). Appcloak: Rapid migra-
tion of legacy applications into cloud. In International
Conference on Cloud Computing, pages 810–817.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., and
Vasilakos, A. V. (2014). Security and privacy for stor-
age and computation in cloud computing. Information
Sciences, 258:371–386.
Weis, J. and Alves-Foss, J. (2011). Securing database as
a service: Issues and compromises. IEEE Security
Privacy, 9(6):49–55.
Yu, A., Sathanur, A. V., and Jandhyala, V. (2012). A partial
homomorphic encryption scheme for secure design
automation on public clouds. In 21st Conference on
Electrical Performance of Electronic Packaging and
Systems, pages 177–180.
Zhang, Q., Cheng, L., and Boutaba, R. (2010). Cloud com-
puting: State-of-the-art and research challenges. Jour-
nal of Internet Services and Applications, 1(1):7–18.
Secure Data Storage Architecture on Cloud Environments
47