Abstract
More and more cloud database services have emerged recently which is economical, convenient and highly scalable. However the security concerns in these services are more prominent than ever before. The users should not rely on the Cloud Service Providers(CSPs) only to protect the integrity and retrievability of their cloud databases. We argue that it is not enough for the cloud db owners to know the existence of damage, but more importantly, they should be able to locate the damages precisely for the recovery afterwards. In this paper we provide fine-grained cloud DB damage examination methods by checking the results of sampling queries. The examination process support element/tuple level damage identification and is cost-efficient based on bloom filters. The process is also server transparent and imperceptible which prevent the CSP be inconsistent to different users.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Pang, H., Tan, K.L.: Authenticating query results in edge computing. In: Proceedings of the International Conference on Data Engineering, pp. 560–571 (2004)
Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and Integrity in Outsourced Databases. ACM Transactions on Storage 2(2) (May 2006)
Sion, R.: Query execution assurance for outsourced databases. In: Proceedings of the 31st VLDB Conference, Trondheim, Norway (2005)
Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.G.: Authentic third-party data publication. In: 14th IFIP 11.3 Working Conference in Database Security, pp. 101–112 (2000)
Narasimha, M., Tsudik, G.: Authentication of Outsourced Databases Using Signature Aggregation and Chaining. In: Li Lee, M., Tan, K.-L., Wuwongse, V. (eds.) DASFAA 2006. LNCS, vol. 3882, pp. 420–436. Springer, Heidelberg (2006)
Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic Authenticated Index Structures for Outsourced Databases. In: SIGMOD (2006)
Xie, M., Wang, H., Yin, J., Meng, X.: Integrity Auditing of Outsourced Data. In: VLDB 2007, pp. 782–793 (2007)
Cheng, W., Pang, H., Tan, K.: Authenticating Multi-dimensional Query Results in Data Publishing. In: Damiani, E., Liu, P. (eds.) Data and Applications Security 2006. LNCS, vol. 4127, pp. 60–73. Springer, Heidelberg (2006)
Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Spatial Outsourcing for Location-based Services. In: ICDE (2008)
Guo, H., Li, Y., Liu, A., Jajodia, S.: A fragile watermarking scheme for detecting malicious modifications of database relations. Information Sciences 176, 1350–1378 (2006)
Fan, L., Cao, P., Almeida, J., Broder, A.Z.: Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol. IEEE/ACM Transactions on Networking 8(3), 281–293 (2000)
Zhang, M., Hong, C., Chen, C.: Server Transparent Query Authentication of Outsourced Database. In: NDBC 2009 (2009) (in Chinese)
Bloom, B.: Space/Time Tradeoffs in Hash Coding with Allowable Errors. Communications of the ACM 13(7), 422–426 (1970)
Juels, A., Kaliski Jr., B.S.: Pors: proofs of retrievability for large files. In: Proc. ACM CCS, pp. 584–597 (2007)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proc. ACM CCS, pp. 598–609 (2007)
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, M., Cai, K., Feng, D. (2010). Fine-Grained Cloud DB Damage Examination Based on Bloom Filters. In: Chen, L., Tang, C., Yang, J., Gao, Y. (eds) Web-Age Information Management. WAIM 2010. Lecture Notes in Computer Science, vol 6184. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14246-8_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-14246-8_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14245-1
Online ISBN: 978-3-642-14246-8
eBook Packages: Computer ScienceComputer Science (R0)