Document Type : Research Article


Faculty of Electrical and Computer Engineering, Malek Ashtar University of Technology, Tehran, Iran.


The use of NoSQL data and its storage in the Cloud is growing rapidly. Due to the accumulation of data in the Cloud, data security against untrusted service providers as well as external attackers becomes a more serious problem. Over the past few years, there are some efforts to secure the outsourcing of NoSQL data, especially column-based and document-based models. However, practical solutions for secure outsourcing of key-value databases have not been identified. This paper attempts to introduce SecureKV as a secure method for outsourcing key-value databases. This method employs a multi-Cloud storage scenario to preserve outsourced data confidentiality. Besides security issues, the proposed method supports executing major key-value queries directly on outsourced data. A prototype of the Redis database management system has
been implemented to show the efficiency and effectiveness of the proposed method. The results imply that, besides security issues, it is efficient and scalable enough in executing key-value-specific queries.


[1] Raluca Ada Popa, Catherine MS Redfield, Nickolai Zeldovich, and Hari Balakrishnan. Cryptdb: protecting confidentiality with encrypted query processing. In Proceedings of the twenty-third ACM symposium on operating systems principles, pages 85–100, 2011.
[2] Pierangela Samarati, S De Capitani di Vimercati, S Murugesan, and I Bojanova. Cloud security: Issues and concerns. Encyclopedia on cloud computing, pages 1–14, 2016.
[3] Mohammad Ali Hadavi, Rasool Jalili, Ernesto Damiani, and Stelvio Cimato. Security and searchability in secret sharing-based data outsourcing. International Journal of Information Security, 14(6):513–529, 2015.
[4] Jason W Woodworth and Mohsen Amini Salehi. S3bd: Secure semantic search over encrypted big data in the cloud. Concurrency and Computation: Practice and Experience, 31(11):e5050, 2019.
[5] Lanxiang Chen, Nan Zhang, Hung-Min Sun, Chin-Chen Chang, Shui Yu, and KimKwang Raymond Choo. Secure search for
encrypted personal health records from big data nosql databases in cloud. Computing, 102(6):1521–1545, 2020.
[6] Mamdouh Alenezi, Muhammad Usama, Khaled Almustafa, Waheed Iqbal, Muhammad Ali Raza, and Tanveer Khan. An efficient, secure, and queryable encryption for nosql-based databases hosted on untrusted cloud environments. International Journal of Information Security and Privacy (IJISP), 13(2):14–31, 2019.
[7] Karamjit Kaur and Rinkle Rani. Modeling and querying data in nosql databases. In 2013 IEEE international conference on big data, pages 1–7. IEEE, 2013.
[8] Ming-Hung Shih and J Morris Chang. Design and analysis of high performance crypt-nosql. In 2017 IEEE Conference on Dependable and Secure Computing, pages 52–59. IEEE, 2017.
[9] Abdulatif Alabdulatif, Ibrahim Khalil, and Xun Yi. Towards secure big data analytic for cloudenabled applications with fully homomorphic encryption. Journal of Parallel and Distributed Computing, 137:192–204, 2020.
[10] Viswanath Gudditti and P Venkata Krishna. Light weight encryption model for map reduce layer to preserve security in the big data and cloud. Materials Today: Proceedings, 2021.
[11] Divyakant Agrawal, Amr El Abbadi, Fatih Emekci, and Ahmed Metwally. Database management as a service: Challenges and opportunities. In 2009 IEEE 25th International Conference on Data Engineering, pages 1709–1716. IEEE, 2009.
[12] Varunya Attasena, J´erˆome Darmont, and Nouria Harbi. Secret sharing for cloud data security: a survey. The VLDB Journal, 26(5):657–681, 2017.
[13] G Viswanath and P Venkata Krishna. Hybrid encryption framework for securing big data storage in multi-cloud environment. Evolutionary Intelligence, 14(2):691–698, 2021.
[14] Gunasekaran Manogaran, Chandu Thota, and M Vijay Kumar. Metaclouddatastorage architecture for big data security in cloud computing. Procedia Computer Science, 87:128–133, 2016.
[15] Rishabh Poddar, Tobias Boelter, and Raluca Ada Popa. Arx: an encrypted database using semantically secure encryption. Cryptology ePrint Archive, 2016.
[16] Gabriela Suntaxi, Aboubakr Achraf El Ghazi, and Klemens B¨ohm. Secrecy and performance models for query processing on outsourced graph data. Distributed and Parallel Databases, 39(1):35–77, 2021.
[17] Muhammad Ali Raza, Muhammad Usama, Waheed Iqbal, and Faisal Bukhari. Secure nosql over cloud using data decomposition and queryable encryption. In International Conference on Intelligent Technologies and Applications, pages
409–421. Springer, 2019.
[18] Xingliang Yuan, Xinyu Wang, Cong Wang, Chen Qian, and Jianxiong Lin. Building an encrypted, distributed, and searchable key-value store. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pages 547–558, 2016.
[19] Xingliang Yuan, Yu Guo, Xinyu Wang, Cong Wang, Baochun Li, and Xiaohua Jia. Enckv: An encrypted key-value store with rich queries. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pages 423–435, 2017.
[20] Meng Zhang, Saiyu Qi, Meixia Miao, and Fuyou Zhang. Enabling compressed encryption for cloud based big data stores. In International Conference on Cryptology and Network Security, pages 270–287. Springer, 2019.
[21] Asadulla Khan Zaki and M Indiramma. A novel redis security extension for nosql database using authentication and encryption. In 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT),
pages 1–6. IEEE, 2015.
[22] Rog´erio Pontes, Francisco Maia, Ricardo Vila¸ca, and Nuno Machado. d’artagnan: A trusted nosql database on untrusted clouds. In 2019 38th Symposium on Reliable Distributed Systems (SRDS), pages 61–6109. IEEE, 2019.