Abstract
Cloud computing provides users with the possibility to store their data in third-party servers. These data centers may be untrusted or susceptible to attacks, hence they could return compromised query results once interrogated. Query integrity has been widely investigated in the literature, and a number of methods have been proposed to allow users to verify that query results are complete (i.e., no qualifying tuples are omitted), fresh (i.e., the newest version of the results are returned), and correct (i.e., the result values are not corrupted). In this paper, we identify a specific scenario in which classical techniques for query integrity appear little suitable and we propose a new solution to overcome these drawbacks. The scenario considered, instantiated in a realistic video surveillance setting, is that of data streams in which append operations and range queries are dominant, and the efficiency is a critical factor.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Examples of such attributes are geographic coordinates, coding, and resolution (their exact definition is out of the scope of this paper).
References
Buccafurri, F., Lax, G., Nicolazzo, S., Nocera, A.: A privacy-preserving solution for tracking people in critical environments. In: Proceedings of the International Workshop on Computers, Software & Applications (COMPSAC 2014), pp. 146–151, V\(\ddot{a}\)ster\(\dot{a}\)s, Sweden. IEEE Computer Society (2014)
Buccafurri, F., Lax, G., Nicolazzo, S., Nocera, A.: Generating k-anonymous logs of people tracing systems in surveilled environments. In: SEBD, pp. 37–44 (2014)
Buccafurri, F., Lax, G., Nicolazzo, S., Nocera, A.: Accountability-preserving anonymous delivery of cloud services. In: Fischer-Hübner, S., Lambrinoudakis, C., López, J. (eds.) TrustBus 2015. LNCS, vol. 9264, pp. 124–135. Springer, Heidelberg (2015)
De Capitani, S., di Vimercati, S., Foresti, S., Jajodia, S.P., Samarati, P.: Integrity for join queries in the cloud. IEEE Trans. Cloud Comput. 1(2), 187–200 (2013)
Hong, J., Wen, T., Gu, Q., Sheng, G.: Query integrity verification based-on mac chain in cloud storage. In: 2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS), pp. 125–129. IEEE (2014)
Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.L.: On technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing, CLOUD 2009, pp. 109–116. IEEE (2009)
Kaufman, L.M.: Data security in the world of cloud computing. IEEE Secur. Priv. 7(4), 61–64 (2009)
Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Authenticated index structures for aggregation queries. ACM Trans. Inf. Syst. Secur. (TISSEC) 13(4), 32 (2010)
Pang, H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying completeness of relational query results in data publishing. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 407–418. ACM (2005)
Samarati, P.: Data security and privacy in the cloud. In: Huang, X., Zhou, J. (eds.) ISPEC 2014. LNCS, vol. 8434, pp. 28–41. Springer, Heidelberg (2014)
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)
Xie, M., Wang, H., Yin, J., Meng, X.: Integrity auditing of outsourced data. In: Proceedings of the 33rd International Conference on Very Large Databases, pp. 782–793. VLDB Endowment (2007)
Yang, Z., Gao, S., Xu, J., Choi, B.: Authentication of range query results in mapreduce environments. In: Proceedings of the Third International Workshop on Cloud Data Management, pp. 25–32. ACM (2011)
Acknowledgment
This work has been partially supported by the Program “Programma Operativo Nazionale Ricerca e Competitività” 2007–2013, Distretto Tecnologico CyberSecurity funded by the Italian Ministry of Education, University and Research.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Buccafurri, F., Lax, G., Nicolazzo, S., Nocera, A. (2016). Range Query Integrity in Cloud Data Streams with Efficient Insertion. In: Foresti, S., Persiano, G. (eds) Cryptology and Network Security. CANS 2016. Lecture Notes in Computer Science(), vol 10052. Springer, Cham. https://doi.org/10.1007/978-3-319-48965-0_50
Download citation
DOI: https://doi.org/10.1007/978-3-319-48965-0_50
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48964-3
Online ISBN: 978-3-319-48965-0
eBook Packages: Computer ScienceComputer Science (R0)