Combining Shamir S Secret Sharing Scheme And Symmetric Key Encryption To Achieve Data Privacy In Databases


Download Combining Shamir S Secret Sharing Scheme And Symmetric Key Encryption To Achieve Data Privacy In Databases PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Combining Shamir S Secret Sharing Scheme And Symmetric Key Encryption To Achieve Data Privacy In Databases book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Combining Shamir's Secret Sharing Scheme and Symmetric Key Encryption to Achieve Data Privacy in Databases


Combining Shamir's Secret Sharing Scheme and Symmetric Key Encryption to Achieve Data Privacy in Databases

Author: Abdel Maguid Tawakol

language: en

Publisher:

Release Date: 2016


DOWNLOAD





The Internet has become an essential tool for communication and information access, and with growing demand, new challenges and usage continue to surface. A complimentary tool that came to exist in recent years is Cloud Computing - an economical solution that serves as an alternative to owning and running computing facilities. While cloud computing has many advantages, there are a number of issues that hamper the adoption of cloud computing. Some of the major concerns, can be classified into one of the following groups: traditional security, availability, and third-party data control. The first set of concerns, revolve around security threats that can expose clients private data. The second set of concerns, revolve around the compromise of the operation of the applications in the cloud. Finally, the last set of concerns involve the legal implications of data and applications being held by a third party. Different solutions exist to deal with traditional security, availability, and third-party data control, separately, but one way to handle traditional security, and third-party data control, is through data encryption. The client has to take responsibility for ensuring that the data is setup in such a way, that even if the cloud service provider is compromised, or has a malicious intent, it is not able to get anything from the customers data. Of course, encrypting the data introduces limitations, with varying tradeoffs for different systems. In this work, we use Shamirs Secret Sharing Scheme and a symmetric key cryptographic system (AES) to encrypt data at a field level, such that it can be stored in the cloud without compromising data privacy. Using Shamirs Secret Sharing Scheme to encrypt numeric field values, gives us the ability to perform efficient addition, subtraction, and multiplication on the encrypted numeric field values. We explore two different ways of using Shamir Secret Sharing Scheme and AES, and discuss the advantages and disadvantages of each. We then propose, and complete, a software implementation for the proposed system. The implementation is used in order to compare execution time, memory usage, and bandwidth usage, to the plaintext and MySQL encrypted versions of the database. Analyzing the benchmarks, we can see how the performance varies for different query types when run on tables with different number of records and field types giving the reader an idea about the cost and tradeoffs of the system.

Blockchain Foundations and Applications


Blockchain Foundations and Applications

Author: Xun Yi

language: en

Publisher: Springer Nature

Release Date: 2022-08-20


DOWNLOAD





This monograph provides a comprehensive and rigorous exposition of the basic concepts and most important modern research results concerning blockchain and its applications. The book includes the required cryptographic fundamentals underpinning the blockchain technology, since understanding of the concepts of cryptography involved in the design of blockchain is necessary for mastering the security guarantees furnished by blockchain. It also contains an introduction to cryptographic primitives, and separate chapters on bitcoin, ethereum and smart contracts, public blockchain, private blockchain, cryptocurrencies, and blockchain applications.This volume is of great interest to active researchers who are keen to develop novel applications of blockchain in the field of their investigatio. Further, it is also beneficial for industry practitioners as well as undergraduate students in computing and information technology.

14th National Computer Security Conference


14th National Computer Security Conference

Author:

language: en

Publisher:

Release Date: 1991


DOWNLOAD