Security Issues in Database Dr.Nermin Hamza Ewais Assistance - - PowerPoint PPT Presentation

security issues in database
SMART_READER_LITE
LIVE PREVIEW

Security Issues in Database Dr.Nermin Hamza Ewais Assistance - - PowerPoint PPT Presentation

Security Issues in Database Dr.Nermin Hamza Ewais Assistance Professor IT department Faculty of Computing and information Technology King Abd El-Aziz University Abstract Many organizations today are implementing cloud-based solutions to


slide-1
SLIDE 1

Security Issues in Database

Dr.Nermin Hamza Ewais Assistance Professor IT department Faculty of Computing and information Technology King Abd El-Aziz University

slide-2
SLIDE 2

Abstract

 Many organizations today are implementing cloud-based solutions to reduce cost

and improve the efficient . Due to its high demand, cloud providers are now

  • ffering a new service besides the traditional services (IaaS, PaaS and Saas) known

as Database as a service or DBaaS which is essentially an on-demand database accessible to the consumers from the cloud over the Internet

 The new trend is to make the database outsourced, which gained benefits such as

increase data availability, reduce, the cost.

 We presented a model based on outsourcing database. The model architecture

performs most of the data processing through the SMP (Secure Middle Part), for reducing computation and communication overhead by partially encrypting the data and information and increasing data confidentiality through using deferent encryption techniques.

2 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-3
SLIDE 3

Agenda

  • 1. Cloud and Cloud Database
  • 2. Database Security
  • 3. The Database security model
  • 1. Overview of the System
  • 2. Components
  • 3. Query Processing
  • 4. Key Management
  • 5. Analysis

3 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-4
SLIDE 4

Agenda

  • 1. Cloud and Cloud Database
  • 2. Database Security
  • 3. The Database security model
  • 1. Overview of the System
  • 2. Components
  • 3. Query Processing
  • 4. Key Management
  • 5. Analysis

4 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-5
SLIDE 5

1- Cloud and Cloud Database

5 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-6
SLIDE 6

Cloud

 The Term Cloud refers to Network or Internet .  In Other words , we can say that the cloud is some

thing which can present in remote location.

 Cloud computing is a general term for the delivery of

hosted services over the internet.( could be software

  • r Hardware)

6 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-7
SLIDE 7

Cloud : Service Categories

 Infrastructure as a service (IaaS)  Platform as a service (PaaS)  Software as a service (SaaS).

7 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-8
SLIDE 8

Cloud : Service Categories

 Infrastructure as a service (IaaS)  Is category of cloud computing services. With IaaS, you rent IT

infrastructure—servers and virtual machines (VMs), storage, networks, operating systems—from a cloud provider on a pay-as- you-go basis..

 Characteristics of IaaS  Distribution of resources as a service  Utility pricing model and variable costs,  Allows multiple users to work on a single set of hardware

8 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-9
SLIDE 9

Cloud : Service Categories

 Platform as a service (PaaS)  a cloud provider delivers hardware and software tools -- usually

those needed for application development -- to its users as a service

 PaaS Characteristics  Develop, test and deploy software and applications  Built-in scalability for load balancing and failover  Web-based tools for the creation, modification and flawless

deployment of User Interfaces

9 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-10
SLIDE 10

Cloud : Service Categories

 Software as a service (SaaS).  SaaS is the basic and most important form of cloud services that

represents the largest portion of the cloud market. It uses the web to distribute applications that are hosted and run by third- party vendors.

 As a client, you can run SaaS applications directly via a web

browser without having to download or install anything.

 Characteristics of SaaS

 Access to commercial software on the web  Centralized software management  Managed software upgrades and integration of different software parts

with help of APIs

10 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-11
SLIDE 11

Cloud : Service Categories

11 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-12
SLIDE 12

Cloud : Service Categories

12 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-13
SLIDE 13

What about Cloud Database

13 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-14
SLIDE 14

Database as Service

 Database as a Service (DBaaS) is a new service model

Based on SaaS, DBaaS moves database management system (DBMS) from a traditional client-server architecture to a third party architecture – where data management is not handled by the data owner.

 The traditional Client-Server : where the data owner

is responsible for managing DBMS and responding to user’s queries

14 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-15
SLIDE 15

Database as Service

 DBaaS eliminates the need for installing,

maintaining and storing data on the local database servers (hard drives or disks).

 DBaaS supports structured, unstructured or semi-

structured data

 Data owners outsource their data to data service

providers such as Google , Amazon , and Microsoft

  • etc. who manage large data sets .

15

18/04/2017

  • Dr. Nermin Hamza Ewais
slide-16
SLIDE 16

Agenda

  • 1. Cloud and Cloud Database
  • 2. Database Security
  • 3. The Database security model
  • 1. Overview of the System
  • 2. Components
  • 3. Query Processing
  • 4. Key Management
  • 5. Analysis

16 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-17
SLIDE 17

2- Database Security

17 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-18
SLIDE 18

Database Security Services

The database security services are:

  • 1. Database Identification and Authentication
  • 2. Database Access control
  • 3. Database Confidentiality
  • 4. Database Integrity
  • 5. Database Availability
  • 6. Database Physical security.

18 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-19
SLIDE 19

Database Identification and Authentication

 This service ensures that the users and programs

are correctly identified and verified.

 This service depends on the operating systems or

database application or both.

 The famous mechanisms are DB authentication

with passwords, operating system authentication, Kerberos etc…

19 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-20
SLIDE 20

20 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-21
SLIDE 21

Database Access control

 Access control service is also called Authorization

security service.

 It ensures that the correctly subject, such as users

programs, can only perform operations on the allowed database object, such as tables and views.

 Discretionary Access Control (DAC)  Mandatory Access Control (MAC)  Role-Based Access Control (RBAC)

21 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-22
SLIDE 22

Database Access control

 Discretionary Access Control (DAC)  Subject access object according to a list of permissions granted

to the subjects.

 In DAC one user could create any object and grant or revoke some

permissions as reading, writing …etc. to another user.

 Example :

 User may transfer object ownership to another user(s).  User may determine the access type of other users.  After several attempts, authorization failures restrict user access.

22 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-23
SLIDE 23

Database Access control

 Mandatory Access Control (MAC)  Policies regulate access to data by subjects on the basis of the

predefined classifications of the subjects and objects in the system

 In mandatory access control (MAC), the system (and not the users)

specifies which subjects can access specific data objects.

 For example, if a user has a security clearance of secret, and he

requests a data object with a security classification of top secret, then the user will be denied access because his clearance is lower than the classification of the object.

23 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-24
SLIDE 24

Database Access control

 Role-Based Access Control (RBAC)  Permissions are assigned according to the Role and are centrally

administered according to the organization structure

 A fundamental difference between DAC and RBAC is that users in

RBAC cannot pass access permissions on to other users DAC.

24 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-25
SLIDE 25

Database Confidentiality

 This service will prevent the improper discovery of information

to unauthorized users.

This service can be achieved by two methods, which are encryption and employee confidentiality training

25 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-26
SLIDE 26

Database Integrity

 Database integrity ensures that both the creation and

changing of information are done according to a set of predefined rules and constrains

 Many mechanisms  Checksum mechanism,  this one is done to ensure the integrity of the stored

data by calculate the check sum of this stored data and then store the result.

 When the data is accessed the checksum is

recalculated to verify the data.

26 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-27
SLIDE 27

Database Availability

 Database Availability services make sure that data is

accessible to the right person when it is needed.

 Availability implies the system fault tolerance and

redundancy in the data.

 The main mechanisms used to reach database availability

is hardware redundancy, database backup, recover log

27 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-28
SLIDE 28

Database Physical security

 This service is often disregarded.  physical security asset is the first

step in database security.

 Several methods can be done in

  • rder to achieve physical security

as:

walls can be built, security

doors, alarms, locks, spring- loaded floors and so on.

28 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-29
SLIDE 29

Take a break

18/04/2017 29

  • Dr. Nermin Hamza Ewais
slide-30
SLIDE 30

Agenda

  • 1. Cloud and Cloud Database
  • 2. Database Security
  • 3. The Database security model
  • 1. Overview of the System
  • 2. Components
  • 3. Query Processing
  • 4. Key Management

30 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-31
SLIDE 31

3- The Database Security Model

31 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-32
SLIDE 32

Agenda

  • 1. Cloud and Cloud Database
  • 2. Database Security
  • 3. The Database security model
  • 1. Overview of the System
  • 2. Components
  • 3. Query Processing
  • 4. Key Management
  • 5. Analysis

32 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-33
SLIDE 33

The Database security model: Overview

 We presente a database security model which

is based on semi-trusted database server model and partial database encryption;

33 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-34
SLIDE 34

The Database security model : Overview

 Trusted model : the trusted database server where the creator,

  • r owner, of the data operates a database

server

 Un-trusted (Database as service) , outsource : server where the owner’s database is stored

at the service provide model … vulnerable

 Semi – Trusted

34 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-35
SLIDE 35

The Database security model: Overview

35

Database encryption refers to the use of encryption techniques to transform a plain text database into a encrypted database, thus making it unreadable to anyone except those who possess the knowledge of the encryption key(s). Partial database encryption: is encryption for the

  • nly confidential columns into database and not all

them

18/04/2017

  • Dr. Nermin Hamza Ewais
slide-36
SLIDE 36

Database Encryption

36 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-37
SLIDE 37

Database Encryption

 There are some important questions to address in planning

which include the followings:

 How many encryption keys will you need?  How will you manage keys?  Where will the keys be stored?  How will you protect access to the encryption keys?  How often should keys change?

37 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-38
SLIDE 38

Database Encryption

 The process of encryption can be performed either 1) Encrypt whole database, if the DBMS supports

the encryption features, or

2) Outside the DBMS, where encryption processing

and key storage is offloaded to a centralized Encryption Servers.

38 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-39
SLIDE 39

Database Encryption : Encrypt whole database

STRENGTHS/BENEFITS

Applications are unaffected

Encryption may already be provided in database product

WEAKNESSES

Extra processing = performance degradation

Data at risk outside the database

Encryption keys are stored in a database table with encrypted text, no separation of keys from the text

In order to separate the keys, additional hardware is required — like HSMs

protection of keys which is based on passwords, are difficult to manage and insecure

Limited choice in algorithms supported

39 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-40
SLIDE 40

Database Encryption: making the encryption out of DBMS

STRENGTHS/BENEFITS

 Off-load crypto processing from database server  Separates the encrypted data from the encryption keys in order to achieve secure

storage

 Easy to apply strong authentication solutions that work with encryption server  Can separate administrator roles  More control over who can accesses the data  Scalable – can scale to handle encryption from many applications and many

databases

 If database incapable of handling the encryption functionality, no need to buy a

new database and migrate data

 Provides end-to-end encryption from the client to encryption server

40 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-41
SLIDE 41

Database Encryption: making the encryption out of DBMS

WEAKNESSES

 Communication overhead  Must administer more servers  Must change or modify applications  Must harden the encryption server with an authentication policy and a way to

monitor and log events

41 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-42
SLIDE 42

The Database Security Model

In our system How to protect Data?

 Encryption (Partial-Encryption)  Management of access Cryptography keys.

42 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-43
SLIDE 43

Agenda

  • 1. Cloud and Cloud Database
  • 2. Database Security
  • 3. The Database security model
  • 1. Overview of the System
  • 2. Model Components
  • 3. Data and Query Processing
  • 4. Key Management
  • 5. Analysis

43 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-44
SLIDE 44

Model component

44 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-45
SLIDE 45

Model component

  • ur database model is divided into three layers:

clients or owners secure Meta Part (SMP), and outsourcing database.

45 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-46
SLIDE 46

Client Database Server Our Security system SMP Secure Middle Part

Client Authentication Module SMM Secure Meta Mediator Server Authentication Module

The Database Security Model

46 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-47
SLIDE 47

The Database Security Model :Clients

The Client side could be database owners or customers

 The database owner: The database owner is the actual database

creator.

 Database Clients or Customers: Database clients are the actual data users,

who read, write and modify the database records according to their privileges.

47 18/04/2017

Client

  • Dr. Nermin Hamza Ewais
slide-48
SLIDE 48

The Database Security Model

Secure Meta Part SMP : Is the middle server that contains (Client authentication, SMM, and Server Authentication)

48

SMP Secure Middle Part

Client Authentication Module SMM Secure Meta Mediator Server Authentication Module

18/04/2017

  • Dr. Nermin Hamza Ewais
slide-49
SLIDE 49

The Database Security Model

The Database Server: Contains:

 The Encrypted Database  The Database Service Provider (DSP)

49

D B

DSP

DB server

18/04/2017

  • Dr. Nermin Hamza Ewais
slide-50
SLIDE 50

Client Database Server Our Security system SMP Secure Middle Part

Client Authentication Module SMM Secure Meta Mediator Server Authentication Module

The Database Security Model : component

50 18/04/2017

Authentication protocol

  • Dr. Nermin Hamza Ewais
slide-51
SLIDE 51

The SMM: Secure Meta Mediator

 The SMM: is the middle server that

contains the keys which will be available to the clients according to their authorization level.

 This server performs the

authorization process. -- Note that the authentication process has been done by the authentication module as mentioned previously and a key session was established to communicate -- Also this server performs the query processing work

Client Query Interfac e Server Query Interfac e

Query Processing

Query Preparation Result Set Preparation

Secure Meta Mediator

51 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-52
SLIDE 52

The SMM: Secure Meta Mediator

 Client query module: This module performs authorization process (according

to the client’s assigned privileges such as Database Access Control Lists (ACL)).

 Query Processing module: the query processing consists of two components

(query Preparation and result set Preparation) the first component will start to prepare the query. The second module prepares the result set of the data and information to be transmitted to the client/owner.

 The server query module: this module sends execution query to the DSP for

retrieving desired record and receives the result set.

Client Query module Server Query module

Query Processing

Query Preparation

Result Set Preparation

Secure Meta Mediator

52 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-53
SLIDE 53

The outsourced database:

 The outsourced database: contains the encrypted data

base and the database server provider (DSP).

 The benefits of database outsourcing are to verify high

availability, cost reduction.

 The outsourcing database also does not enable the data to

be decrypted, to be analyzed or either to be tempered by making the main work be performed on SMM.

53 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-54
SLIDE 54

Agenda

  • 1. Cloud and Cloud Database
  • 2. Database Security
  • 3. The Database security model
  • 1. Overview of the System
  • 2. Model Components
  • 3. Data and Query Processing
  • 4. Key Management

54 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-55
SLIDE 55

The Database Security Model: Data and

Query Processing

The database tables contains 3 types of data can be classified to:

 Un-encrypted data.  Owner data.  Client private data.

55 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-56
SLIDE 56

The Database Security Model : Data and Query Processing

56

Field1 Field2 Field3 Field4 Client data

  • wner data

Client data

  • wner data

Field1 Field2 Field3 Field4 EClient key (Client data) EOwner key(owner data) EClient key(Client data) Owner data Not encrypted as

  • rganization need

Relation Name Relation Name

18/04/2017

  • Dr. Nermin Hamza Ewais
slide-57
SLIDE 57

The Database Security Model : Data and Query Processing

Where is the key stored ?

57

Key name Storage place

Owner key SMM Encrypted with the public key of the authorized user Client key SMM and/or smart token

18/04/2017

  • Dr. Nermin Hamza Ewais
slide-58
SLIDE 58

The Database Security Model : Data and Query Processing

The Database Model Description

58

2- The Owners design and create the DB 1- The organization decides to outsource its DB

18/04/2017

  • Dr. Nermin Hamza Ewais
slide-59
SLIDE 59

Database

Encrypt with creation Key SMM Secure Meta Mediator Database Server DB

Creation Key Meta Data

The Database Security Model

59 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-60
SLIDE 60

Client SMM

Secure Meta Mediator 1- The client connects to the application through secure authentication using our authentication protocol.

Client Query Client Query Interface Server Query Interface

Session Key

Query Processing

Query Preparation Result Set Preparation

Query Processing

The Database Security Model

60 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-61
SLIDE 61

SMM

Secure Meta Mediator

Client Query Query Processing Server Query Database Server

Database

DSP The Prepared Query The Result Set

The Database Security Model

61 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-62
SLIDE 62

Client SMM

Secure Meta Mediator

Result Set Client Query Query Processing Server Query

Session Key

The Database Security Model

62 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-63
SLIDE 63

Query

63

Storage Comparison

18/04/2017

  • Dr. Nermin Hamza Ewais
slide-64
SLIDE 64

Illustration Example

64 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-65
SLIDE 65

Illustration Example

65 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-66
SLIDE 66

Agenda

  • 1. Cloud and Cloud Database
  • 2. Database Security
  • 3. The Database security model
  • 1. Overview of the System
  • 2. Model Components
  • 3. Data and Query Processing
  • 4. Key Management
  • 5. Analysis

66 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-67
SLIDE 67

The Database Security Model : Key Management

 Used Key Types:

  • 1. Key- pair (public and private)
  • 2. Session keys
  • 3. Secret keys. (Stored encrypted by public

key for the authorized person)

18/04/2017 67

  • Dr. Nermin Hamza Ewais
slide-68
SLIDE 68

The Database Security Model : Key Management

 Key backup and recovery  Session key needs no recovery  Secrete keys: SMM can take backup Smart Token… according to organization

policies

68 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-69
SLIDE 69

The Database Security Model : Key Management

Key storage

The key (private key of the client) …At the

smart token .

The session keys… At the memory The store secret keys … the SMM or smart

token.

69 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-70
SLIDE 70

The Database Security Model : Key Management

 Key Length

Key- pair 2048 bits Session key 256 Secrete keys 256

Can be upgraded to 512

70 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-71
SLIDE 71

The Database Security Model : Key Management Key Life Time :

Key lifetime is a specific time period during which a cryptographic key setting remains in effect.

71 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-72
SLIDE 72

The Database Security Model

What Happen if Database Keys changed?

72 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-73
SLIDE 73

The Database Security Model : Key Management

UPDATE table_name SET field_name = new_value WHERE condition

UPDATE (relation-name) SET (field-name) = Enew SMM key(DSMMkey(oldvalue)) WHERE some-condition

73 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-74
SLIDE 74

Agenda

  • 1. Cloud and Cloud Database
  • 2. Database Security
  • 3. The Database security model
  • 1. Overview of the System
  • 2. Model Components
  • 3. Data and Query Processing
  • 4. Key Management
  • 5. Analysis

74 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-75
SLIDE 75

The Database Security Model : Analysis

 Encryption = Extra Disk +Extra CPU cycle  Many factors can be affected:

 Encryption algorithm.  Key place  Key length  Data base encryption layer

75 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-76
SLIDE 76

The Database Security Model : analysis

Performance Comparison

76

  • Dr. Nermin Hamza Ewais

500 1000 1500 2000 2500 3000 1 116 230 600 1300 7500 11345 13577 Time in milleseconds number of returned records

Query on one table and decrypt for one field

plain column

18/04/2017

slide-77
SLIDE 77

The Database Security Model : analysis

Performance Comparison

77

  • Dr. Nermin Hamza Ewais

500 1000 1500 2000 1 150 550 820 2550 3800 5000 Time in milleseconds Number of returned records

Query on one table and decrypt two fields

plain columns encrypted columns

18/04/2017

slide-78
SLIDE 78

The Database Security Model : analysis

Performance Comparison

78

  • Dr. Nermin Hamza Ewais

3000 6000 9000 12000 15000 18000 1 150 550 820 2550 3800 5000 Time in milleseconds Number of returned record

Query on two tables and encryption for two fields

Plain columns Encrypted columns

18/04/2017

slide-79
SLIDE 79

The Database Security Model : analysis

Performance Comparison

79

  • Dr. Nermin Hamza Ewais

0.00% 200.00% 400.00% 600.00% 800.00% 1 150 550 820 2550 3800 5000

percentage of increasing

percentage of increasing

18/04/2017

slide-80
SLIDE 80

The Database Security Model : analysis

Performance Performance

80

  • Dr. Nermin Hamza Ewais

10000 20000 30000 40000 50000 60000 100 200 400 500 600 800 1000 execution time in millseconds number of inserted rows

insertion at one table with an encrypted column

plain encrypted 0.00% 2.00% 4.00% 6.00% 8.00% 10.00% 12.00% 14.00% 16.00% 100 200 400 600 800 1000 percentage of increasing in time number of inserted rows

increasing in time in insearion process for one-field Encryption

percentage of increasing

18/04/2017

slide-81
SLIDE 81

Conclusion

 We present a D.B. security Model based on mixed-encryption

with semi- trusted data base server.

 Our DB security model based on partial-encrypted database .

18/04/2017 81

  • Dr. Nermin Hamza Ewais
slide-82
SLIDE 82

Publication:

 Hamza. N. and Hassan.B, "A Dynamic ID-based authentication

scheme with smart token ", International Conference

  • n:

Computer Engineering & Systems, 2009. ICCES 2009. Page(s): 294 – 299

 Hamza.

N. and Hassan.B, “A proposal for an ID-Based authentication scheme using smart token.”, scientific conference on cyber crime&information security, ACU, 2009

 Al thneibat. Ahmed, Hasan.Bahaa Eldin M.,

  • Hegazy. Abd El

Fatah .A., Hamza. Nermine, “Secure Outsourced Database Architecture”, IJCSNS International Journal

  • f

Computer Science and Network Security, VOL.10 No.5, May 2010.

82 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-83
SLIDE 83

Thank you

83 18/04/2017

  • Dr. Nermin Hamza Ewais
slide-84
SLIDE 84

Questions

84 18/04/2017

  • Dr. Nermin Hamza Ewais