Académique Documents
Professionnel Documents
Culture Documents
I.
I NTRODUCTION
During the last couple of years, Cloud Computing became a much bigger trend in the business and networking
world, with a predicted increase of 130% by 2016, as IDC
[1] announced during their last event, in September 2013.
Ensuring the security is considered to be the most crucial
issue that cloud service providers are facing, as users often
share sensitive information with the cloud blindly and they
can not be sure that providers are trusted or not. There are
numerous security vulnerabilities for CC as it encompasses
many technologies including networks, databases, operating
systems, virtualization, resource scheduling, load balancing
and memory management. Security problems faced by these
systems are applicable to cloud computing as well, therefore
cloud providers should address privacy and security issues as
a matter of high and urgent priority.
Even though CC offers limitless flexibility, reliability, enhanced collaboration and unlimited storage, how secure is it
after all? How can we be sure that our data is safe over the
cloud? Dealing with single cloud providers is becoming less
popular due to potential problems that can affect our data, such
as service availability failure (e.g. some catastrophe befalling
the cloud service provider) and the possibility that there are
malicious insiders in the single cloud (e.g. stolen data by an
attacker who found a vulnerability). To this end we have to
come up with a way to secure those files. In recent years,
there has been a move towards multi-clouds, intercloud or
cloud-of-clouds. As a consequence, since there is no fully
secure and truthful service provider that can host our sensitive
IV.
P ROPOSED M ODEL
Our multi-cloud database model does not preserve privacy by encryption; rather privacy is ensured by using multiclouds service providers and the secret sharing mechanism.
This avoids the negative impact of using a single cloud
provider and encryption on queries. These techniques permit customers with different types of database queries (i.e.
aggregation, range and exact match) to avoid the risk of a
malicious insider in the cloud and prevent the loss of data
in case of a datastore critical damage. As we have already
mentioned to preserve security and privacy of users sensitive
information, data is replicated among a predefined number
of cloud service providers (CSP) using Shamirs algorithm.
The database management system (DBMS) is in charge of
managing and controlling the operations between the client
Figure 3.
Figure 2.
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
V.
C ONCLUSION
[17]
[18]
[19]
[20]
[21]