An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments

An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments

Mamdouh Alenezi, Muhammad Usama, Khaled Almustafa, Waheed Iqbal, Muhammad Ali Raza, Tanveer Khan
Copyright: © 2019 |Pages: 18
DOI: 10.4018/IJISP.2019040102
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

NoSQL-based databases are attractive to store and manage big data mainly due to high scalability and data modeling flexibility. However, security in NoSQL-based databases is weak which raises concerns for users. Specifically, security of data at rest is a high concern for the users deployed their NoSQL-based solutions on the cloud because unauthorized access to the servers will expose the data easily. There have been some efforts to enable encryption for data at rest for NoSQL databases. However, existing solutions do not support secure query processing, and data communication over the Internet and performance of the proposed solutions are also not good. In this article, the authors address NoSQL data at rest security concern by introducing a system which is capable to dynamically encrypt/decrypt data, support secure query processing, and seamlessly integrate with any NoSQL- based database. The proposed solution is based on a combination of chaotic encryption and Order Preserving Encryption (OPE). The experimental evaluation showed excellent results when integrated the solution with MongoDB and compared with the state-of-the-art existing work.
Article Preview
Top

1. Introduction

Nowadays, NoSQL databases are widely used to store and process Big Data mainly due to high performance, scalability, and flexibility features (Schram & Anderson, 2012; Tudorica & Bucur, 2011; Pokorny, 2013). These benefits became possible mainly due to ease of data distribution and shredding in the NoSQL systems. Relational Database Management Systems (RDBMS) are famous for providing the surety of ACID properties, however, performance and scalability of RDBMS are poor after database size start growing dramatically. There are many applications which may not require all ACID properties. For example, social network applications can tolerate relaxation in strict consistency. Moreover, NoSQL databases do not need a strict schema which provides flexibility to the users to update data easily (Okman, Gal-Oz, Gonen, Gudes, & Abramov, 2011). NoSql databases support availability, partition tolerance, and high performance. However, it relaxes data consistency as compared to RDBMS, though most of the NoSQL database support eventual consistency which is feasible and can be neglected in the most of cases because any change in the data will propagate to all the node within few milliseconds and makes the data consistent quickly. Therefore, NoSQL databases are attractive and used in many large-scale applications.

One of the major disadvantages of the NoSQL database is a weak security support which raises concerns for users. Specifically, NoSQL databases store data in flat files which increases security concerns of data at rest. This concern severely increases when NoSQL-bases solutions are deployed on un-trusted servers specifically on the cloud because any unauthorized access beaches data confidentiality easily. Some of the NoSQL-based databases provide data encryption methods to ensure data security and confidentiality (Nafi, Kar, Hoque, & Hashem, 2013), (Meyer & Schwenk, 2013). However, the data-at-rest and data-at-transit remain vulnerable as these systems do not provide query processing on encrypted data. Commonly, DES (Data Encryption Standard), AES (Advanced Encryption Standard), Hashing (MD5, SHA) techniques etc. are implemented for data-at-rest encryption but data needs to be decrypted before querying the database. Additionally, these systems require transport layer security protocols and method e.g., SSL, IPSec, TLS and SSH to ensure security during data-at-transit. These techniques increase processing and communication time overhead to ensure security for server-to-server and server-to-client communication. Moreover, plain data exists in memory as query processing over encrypted data is not supported.

Primarily, NoSQL databases were designed and developed without focusing on data security. Thus, third-party tools and services were employed to secure NoSQL databases (Okman, Gal-Oz, Gonen, Gudes, & Abramov, 2011). Moreover, distributed architecture of NoSQL databases exposes to various security vulnerabilities e.g. accidental modifications, illegal use or unauthorized access, administrative or logical decontrols, insecure communication channel, etc. (Zahid, Masood, & Shibli, 2014; Baccam, 2010). This brings new challenges to protect sensitive and critical data from unauthorized access and illegal usage in NoSQL databases. Classic cryptographic techniques can be employed to protect against various security vulnerabilities, and preserve data security during data storage and communication. However, original data remains vulnerable during query processing in the NoSQL database, especially while processing personal information related to healthcare and personal financial transaction (Lin, Tsai, & Lin, 2014). Moreover, NoSQL databases are deployed on public clouds to leverage the benefits of adaptive resource provisioning (Iqbal W., Dailey, Carrera, & Janecek, 2011) and pay-as-you-go features. Which makes the data of NoSQL vulnerable and easy to access by unintended users.

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing