Cloud decision-support systems : Security Challenges and Issues

Authors

  • Somayeh Sobati Moghadam  Computer and Electrical Engineering Faculty, Hakim Sabzevari University, Sabzevar, Iran

Keywords:

Decision Support System, Cloud Computing, Data Privacy, Cloud Security.

Abstract

Decision support system is a specific class of information systems to support data-oriented analyses and business performance enhancement. Cloud-based decision support system becomes a popular choice because of the value it can provide to the businesses. However, since decision support data are very sensitive, data privacy remains one of the top concerns. In this paper, we review the security and cryptographic mechanisms that aim at making decision support system secure in a cloud environment, and discuss current related research challenges.

References

  1. Rakesh Agrawal, Ramakrishnan Srikant, and Dilys Thomas. Privacy preserving olap. In Proceedings of the 2005 ACM SIGMOD international conference on Management of data, pages 251-262. ACM, 2005.
  2. Varunya Attasena, Nouria Harbi, and Jerome Darmont. A novel multi-secret sharing approach for secure data warehousing and on-line analysis processing in the cloud. International Journal of Data Warehousing and Mining, 11(2):21-42, April-June 2015.
  3. Mihir Bellare, Alexandra Boldyreva, and Adam O'Neill. Deterministic and efficiently searchable encryption. In Advances in Cryptology-CRYPTO 2007, pages 535-552. Springer, 2007.
  4. Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, and Joe Zimmerman. Semantically secure order revealing encryption: Multi-input functional encryption without obfuscation. In Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II, pages 563-594, 2015.
  5. Dan Boneh, Amit Sahai, and Brent Waters. Functional encryption: a new vision for public-key cryptography. Communications of the ACM, 55(11):56-64, 2012.
  6. Oracle Corporation. Data masking best practices. Oracle White Paper, 2010.
  7. Ronald Cramery, Rosario Gennaroz, and Berry Schoenmakersx. A secure and optimally cient multi-authority election scheme.1997.
  8. Ivan Damgard, Martin Geisler, and Mikkel Kroigaard. Efficient and secure comparison for on-line auctions. In Josef Pieprzyk, Hossein Ghodosi, and Ed Dawson, editors, Information Security and Privacy, volume 4586 of Lecture Notes in Computer Science, pages 416-430. Springer Berlin Heidelberg, 2007.
  9. Khaled Dehdouh, Fadila Bentayeb, Omar Boussaid, and Nadia Kabachi. Towards an OLAP environment for column-oriented data warehouses. In 16th International Conference on Data Warehousing and Knowledge Discovery, DaWaK 2014, Munich, Germany, Lecture Notes in Computer Science, pages 221-232, 2014.
  10. Yvo Desmedt and Yair Frankel. Threshold cryptosystems. In Advances in Cryptology—CRYPTO'89 Proceedings, pages 307-315. Springer, 1990.
  11. Cynthia Dwork. Differential privacy. In Encyclopedia of Cryptography and Security, pages 338-340. Springer,  2011.
  12. Tingjian Ge and Stan Zdonik. Answering aggregation queries in a secure system model. In Proceedings of the 33rd international conference on Very large data bases, pages 519-530. VLDB Endowment, 2007.
  13. Craig Gentry. A fully homomorphic encryption scheme. PhD thesis, Stanford University, 2009.
  14. Shafi Goldwasser, S Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, and Hong-Sheng Zhou. Multi-input functional encryption. In Advances in Cryptology-EUROCRYPT 2014, pages 578-602. Springer, 2014.
  15. Hakan Hacigumu¸s, Bala Iyer, Chen Li, and Sharad Mehrotra. Executing sql over encrypted data in the database-service-provider model. In Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, SIGMOD '02, pages 216-227, New York, NY, USA, ACM, 2002.
  16. Hakan Hacıgumu¸s, Bala Iyer, and Sharad Mehrotra. Efficient execution of aggregation queries over encrypted relational databases. In Database Systems for Advanced Applications, pages 125-136. Springer, 2004.
  17. Bijit Hore, Sharad Mehrotra, Mustafa Canim, and Murat Kantarcioglu. Secure multidimensional range queries over outsourced data. The VLDB Journal—The International Journal on Very Large Data Bases, 21(3):333-358, 2012.
  18. Hasan Kadhem, Toshiyuki Amagasa, and Hiroyuki Kitagawa. A secure and efficient order preserving encryption scheme for relational databases. In KMIS, pages 25-35, 2010.
  19. Hasan Kadhem, Toshiyuki Amagasa, and Hiroyuki Kitagawa. Optimization techniques for range queries in the multivaluedpartial order preserving encryption scheme. In Knowledge Discovery, Knowledge Engineering and Knowledge Management, pages 338-353. Springer, 2013.
  20. Claudivan Cruz Lopes, Valéria Cesário Times, Stan Matwin, Ricardo Rodrigues Ciferri, and Cristina Dutra de Aguiar Ciferri. Processing olap queries over an encrypted data warehouse stored in the cloud. In Data Warehousing and Knowledge Discovery, pages 195-207. Springer, 2014.
  21. Einar Mykletun and Gene Tsudik. Aggregation queries in the database-as-a-service model. In Data and Applications Security XX, pages 89-103. Springer, 2006.
  22. Christian Neuhaus and Andreas Polze. Cloud security mechanisms.
  23. Adam O'Neill. Definitional issues in functional encryption. IACR Cryptology ePrint Archive, 2010:556, 2010.
  24. Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Advances in cryptology EUROCRYPT'99, pages 223-238. Springer, 1999.
  25. Raluca Ada Popa, Catherine Redfield, Nickolai Zeldovich, and Hari Balakrishnan. Cryptdb: protecting confidentiality with encrypted query processing. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pages 85-100. ACM, 2011.
  26. Cecilia M Procopiuc and Divesh Srivastava. Efficient table anonymization for aggregate query answering. In Data Engineering, 2009. ICDE'09. IEEE 25th International Conference on, pages 1291-1294. IEEE, 2009.
  27. Adi Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
  28. Victor Shoup. Practical threshold signatures. In Advances in Cryptology—EUROCRYPT 2000, pages 207-220. Springer, 2000.
  29. Brian Thompson, Stuart Haber, William G Horne, Tomas Sander, and Danfeng Yao. Privacy-preserving computation and verification of aggregate queries on outsourced databases. In Privacy Enhancing Technologies, pages 185-201. Springer, 2009.
  30. Transaction Processing Performance Council. TPC Benchmark H Standard Specification Revision 2.8.0. www.tpc.org/tpch/, 2008.
  31. Stephen Tu, M Frans Kaashoek, Samuel Madden, and Nickolai Zeldovich. Processing analytical queries over encrypted data. In Proceedings of the VLDB Endowment, volume 6, pages 289-300. VLDB Endowment, 2013.
  32. Shiyuan Wang, Divyakant Agrawal, and Amr El Abbadi. A comprehensive framework for secure query processing on relational data in the cloud. In Secure Data Management, pages 52-69. Springer, 2011.
  33. Xiaokui Xiao, Gabriel Bender, Michael Hay, and Johannes Gehrke. ireduct: Differential privacy with reduced relative errors. In Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, pages 229-240. ACM, 2011.
  34. Li Xiong, Subramanyam Chitti, and Ling Liu. Preserving data privacy in outsourcing data aggregation services. ACM Transactions on Internet Technology (TOIT), 7(3):17, 2007.
  35. Andrew Chi-Chih Yao. How to generate and exchange secrets. In Foundations of Computer Science, 1986., 27th Annual Symposium on, pages 162-167. IEEE, 1986.
  36. Noel Yuhanna. Your enterprise database security strategy 2010. Forrester Research, September, 2009.
  37. Santos, Ricardo Jorge, Jorge Bernardino, and Marco Vieira. "A data masking technique for data warehouses." Proceedings of the 15th Symposium on International Database Engineering & Applications. ACM, 2011.
  38. Emekci, Fatih, Divyakant Agrawal, and Amr El Abbadi. "Abacus: A distributed middleware for privacy preserving data sharing across private data warehouses." Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware. Springer-Verlag New York, Inc., 2005.
  39. Secure Hash Standart. http://www.itl.nist.gov/fipspubs/fip180-1.htm.
  40. Z. He, W. K. Wong, B. Kao, D. W. Cheung, R. Li, S. Yiu, and E. Lo. SDB: A secure query processing system with data interoperability. PVLDB, 8(12):1876-1879, 2015.
  41. A. C. Yao. Protocols for secure computations. In Foundations of Computer Science, 1982. SFCS'08. 23rd Annual Symposium on, pages 160-164. IEEE, 1982.
  42. Chau, K.W., Cao, Y., Anson, M. and Zhang, J., Application of data warehouse and decision support system in construction anagement. Automation in construction, 12(2), pp.213-224, 2003.

Downloads

Published

2017-10-31

Issue

Section

Research Articles

How to Cite

[1]
Somayeh Sobati Moghadam, " Cloud decision-support systems : Security Challenges and Issues , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.93-99, September-October-2017.