Skip to main content

Range Query Integrity in Cloud Data Streams with Efficient Insertion

  • Conference paper
  • First Online:
Cryptology and Network Security (CANS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10052))

Included in the following conference series:

Abstract

Cloud computing provides users with the possibility to store their data in third-party servers. These data centers may be untrusted or susceptible to attacks, hence they could return compromised query results once interrogated. Query integrity has been widely investigated in the literature, and a number of methods have been proposed to allow users to verify that query results are complete (i.e., no qualifying tuples are omitted), fresh (i.e., the newest version of the results are returned), and correct (i.e., the result values are not corrupted). In this paper, we identify a specific scenario in which classical techniques for query integrity appear little suitable and we propose a new solution to overcome these drawbacks. The scenario considered, instantiated in a realistic video surveillance setting, is that of data streams in which append operations and range queries are dominant, and the efficiency is a critical factor.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Examples of such attributes are geographic coordinates, coding, and resolution (their exact definition is out of the scope of this paper).

References

  1. Buccafurri, F., Lax, G., Nicolazzo, S., Nocera, A.: A privacy-preserving solution for tracking people in critical environments. In: Proceedings of the International Workshop on Computers, Software & Applications (COMPSAC 2014), pp. 146–151, V\(\ddot{a}\)ster\(\dot{a}\)s, Sweden. IEEE Computer Society (2014)

    Google Scholar 

  2. Buccafurri, F., Lax, G., Nicolazzo, S., Nocera, A.: Generating k-anonymous logs of people tracing systems in surveilled environments. In: SEBD, pp. 37–44 (2014)

    Google Scholar 

  3. Buccafurri, F., Lax, G., Nicolazzo, S., Nocera, A.: Accountability-preserving anonymous delivery of cloud services. In: Fischer-Hübner, S., Lambrinoudakis, C., López, J. (eds.) TrustBus 2015. LNCS, vol. 9264, pp. 124–135. Springer, Heidelberg (2015)

    Chapter  Google Scholar 

  4. De Capitani, S., di Vimercati, S., Foresti, S., Jajodia, S.P., Samarati, P.: Integrity for join queries in the cloud. IEEE Trans. Cloud Comput. 1(2), 187–200 (2013)

    Article  Google Scholar 

  5. Hong, J., Wen, T., Gu, Q., Sheng, G.: Query integrity verification based-on mac chain in cloud storage. In: 2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS), pp. 125–129. IEEE (2014)

    Google Scholar 

  6. Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.L.: On technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing, CLOUD 2009, pp. 109–116. IEEE (2009)

    Google Scholar 

  7. Kaufman, L.M.: Data security in the world of cloud computing. IEEE Secur. Priv. 7(4), 61–64 (2009)

    Article  Google Scholar 

  8. Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Authenticated index structures for aggregation queries. ACM Trans. Inf. Syst. Secur. (TISSEC) 13(4), 32 (2010)

    Article  Google Scholar 

  9. Pang, H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying completeness of relational query results in data publishing. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 407–418. ACM (2005)

    Google Scholar 

  10. Samarati, P.: Data security and privacy in the cloud. In: Huang, X., Zhou, J. (eds.) ISPEC 2014. LNCS, vol. 8434, pp. 28–41. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  11. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)

    Article  Google Scholar 

  12. Xie, M., Wang, H., Yin, J., Meng, X.: Integrity auditing of outsourced data. In: Proceedings of the 33rd International Conference on Very Large Databases, pp. 782–793. VLDB Endowment (2007)

    Google Scholar 

  13. Yang, Z., Gao, S., Xu, J., Choi, B.: Authentication of range query results in mapreduce environments. In: Proceedings of the Third International Workshop on Cloud Data Management, pp. 25–32. ACM (2011)

    Google Scholar 

Download references

Acknowledgment

This work has been partially supported by the Program “Programma Operativo Nazionale Ricerca e Competitività” 2007–2013, Distretto Tecnologico CyberSecurity funded by the Italian Ministry of Education, University and Research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Francesco Buccafurri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Buccafurri, F., Lax, G., Nicolazzo, S., Nocera, A. (2016). Range Query Integrity in Cloud Data Streams with Efficient Insertion. In: Foresti, S., Persiano, G. (eds) Cryptology and Network Security. CANS 2016. Lecture Notes in Computer Science(), vol 10052. Springer, Cham. https://doi.org/10.1007/978-3-319-48965-0_50

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48965-0_50

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48964-3

  • Online ISBN: 978-3-319-48965-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics