Abstract Title

The Use of Integrity Coded Database (ICDB) to Prevent Data Tampering in Clouds

Disciplines

Information Security

Abstract

With the cloud becoming an ever cheaper, reliable and more efficient option, companies will be looking to abandon their costly infrastructure and move to an offsite storage system. The only remaining concern is data security. While many people have focused on the external threats, our research has focused on creating a database that cannot be tampered with. While the service provider hosting the cloud may be trustworthy it is impossible to know if every employee who has access to the database is. By converting the original database into an Integrity Coded Database (ICDB) all data have corresponding cryptographic codes generated by the user. Anyone other than the user, who alters the database will unable to generate this code. This allows for an automatic check if the data has been tampered with. This research will focus on the most efficient way to implement this in terms of size and speed.

Comments

Poster #W28

This document is currently not available here.

Share

COinS
 

The Use of Integrity Coded Database (ICDB) to Prevent Data Tampering in Clouds

With the cloud becoming an ever cheaper, reliable and more efficient option, companies will be looking to abandon their costly infrastructure and move to an offsite storage system. The only remaining concern is data security. While many people have focused on the external threats, our research has focused on creating a database that cannot be tampered with. While the service provider hosting the cloud may be trustworthy it is impossible to know if every employee who has access to the database is. By converting the original database into an Integrity Coded Database (ICDB) all data have corresponding cryptographic codes generated by the user. Anyone other than the user, who alters the database will unable to generate this code. This allows for an automatic check if the data has been tampered with. This research will focus on the most efficient way to implement this in terms of size and speed.