Abstract
Cloud computing enables users with limited resources to accomplish complex computation. Meanwhile, the massive human physiological data generated by Wireless Body Area Network (WBAN) can be benefited by it through being stored in cloud servers. However, cloud storage of human physiological data is challenged by some issues, while one of them is soundness verification. Although local WBAN user is not powerful enough to compute the result on whole data repository, he may have concern on the correctness of the results from cloud which he pays for. To address this problem, this paper proposes a DMB+ tree data structure, and designs a query and verification algorithm for human physiological data in cloud computing environment based on DMB+ tree. By reducing the number of layers returned from the query tree, the algorithm reduces the height of the tree when verifying, thus improving the efficiency of query validation. The experimental results show that the performances in time and network traffic of DMB+ query verification are superior to Merkle tree and digital signature algorithm.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Merkle, R.C.: Protocols for public key cryptosystems. In: IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 122–134 (1980)
Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, New York (1990). https://doi.org/10.1007/0-387-34805-0_21
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Nist, C.: The digital signature standard. Commun. ACM 35(7), 36–40 (1992)
Pang, H., Tan, K.: Authenticating query results in edge computing. In: 20th International Conference on Data Engineering, Boston, MA, USA, pp. 560–571 (2004)
Pang, H.H., Jain, A., Ramamritham, K., et al.: Verifying completeness of relational query results in data publishing. In: ACM SIGMOD International Conference on Management of Data, Baltimore, Maryland, USA, pp. 407–418 (2005)
Cheng, W., Pang, H., Tan, K.-L.: Authenticating multi-dimensional query results in data publishing. In: Damiani, E., Liu, P. (eds.) DBSec 2006. LNCS, vol. 4127, pp. 60–73. Springer, Heidelberg (2006). https://doi.org/10.1007/11805588_5
Ateniese, G., Burns, R., Curtmola, R., et al.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14(1), 1–34 (2011)
Lund, C., Fortnow, L., Karloff, H., et al.: Algebraic methods for interactive proof systems. J. ACM 39(4), 859–868 (1992)
Shamir, A.: IP = PSPACE (interactive proof = polynomial space). In: 31st Annual Symposium on Foundations of Computer Science, St. Louis, Missouri, USA, vol. 1, pp. 11–15 (1990)
Wu, J., Ni, W., Zhang, S.: Generalization based privacy-preserving provenance publishing. In: Meng, X., Li, R., Wang, K., Niu, B., Wang, X., Zhao, G. (eds.) WISA 2018. LNCS, vol. 11242, pp. 287–299. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-02934-0_27
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Gao, Y., Yao, L., Yu, J. (2019). Research of Query Verification Algorithm on Body Sensing Data in Cloud Computing Environment. In: Ni, W., Wang, X., Song, W., Li, Y. (eds) Web Information Systems and Applications. WISA 2019. Lecture Notes in Computer Science(), vol 11817. Springer, Cham. https://doi.org/10.1007/978-3-030-30952-7_20
Download citation
DOI: https://doi.org/10.1007/978-3-030-30952-7_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30951-0
Online ISBN: 978-3-030-30952-7
eBook Packages: Computer ScienceComputer Science (R0)