Skip to main content

Ensuring the Big Data Integrity Through Verifiable Zero-Knowledge Operations

  • Conference paper
  • First Online:
Mobile Internet Security (MobiSec 2021)

Abstract

Information from databases is exposed to threats at all stages of its existence: from recording and storing in the database to processing and returning to the user. Big Data systems combine multiple DBMSs and databases. The problem of data integrity is the most acute in them. The article describes an approach to control the integrity of Big Data during their processing, based on verifiable zero knowledge operations. It can be applied to various complex systems containing heterogeneous Big Data databases. The proposed approach implements prospective data integrity protection against existing and hypothetical future threats.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Goddijn, I., Kouns, J.: 2020 Q1 Report Data Breach QuickView. Risk Based Security (2020)

    Google Scholar 

  2. Anada, H.: Decentralized multi-authority anonymous authentication for global identities with non-interactive proofs. J. Internet Serv. Inf. Secur. (JISIS) 10(4), 23–37 (2020). https://doi.org/10.22667/JISIS.2020.11.30.023

  3. Duong, D.H., Susilo W., Trinh V.C.: Wildcarded identity-based encryption with constant-size ciphertext and secret key. J. Wirel. Mobile Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(2), pp. 74–86 (2020). https://doi.org/10.22667/JOWUA.2020.06.30.074

  4. Dutta, P., Susilo, W., Duong, D.H., Baek, J., Roy, P.S.: Identity-based unidirectional proxy re-encryption and re-signature in standard model: lattice-based constructions. J. Int. Serv. Inf. Secur. (JISIS) 10(4), 1–22 (2020). https://doi.org/10.22667/JISIS.2020.11.30.001

  5. Nowaczewski, S., Mazurczyk, W.: Securing future internet and 5G using customer edge switching using DNSCrypt and DNSSEC. J. Wirel. Mobile Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(3), 87–106 (2020). https://doi.org/10.22667/JOWUA.2020.09.30.087

  6. Wong, S.K., Yiu, S.M.: Location spoofing attack detection with pre-installed sensors in mobile devices. J. Wirel. Mobile Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 16–30 (2020). https://doi.org/10.22667/JOWUA.2020.12.31.016

  7. Thuraisingham, B.: Database security: past, present, and future. In: 2015 IEEE International Congress on Big Data, pp. 772–774. IEEE (2015)

    Google Scholar 

  8. Poltavtseva, M.A.: Evolution of data management systems and their security. In: Proceedings - 2019 International Conference on Engineering Technologies and Computer Science: Innovation and Application, EnT 2019, pp. 25–29 (2019). https://doi.org/10.1109/EnT.2019.00010

  9. Poltavtsev, A.A., Khabarov, A.R., Selyankin, A.O.: Inference attacks and information security in databases. Autom. Control. Comput. Sci. 54(8), 829–833 (2020). https://doi.org/10.3103/S0146411620080271

    Article  Google Scholar 

  10. Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression (1998)

    Google Scholar 

  11. Machanavajjhala, A., et al.: l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data (TKDD), 1(1), 3-es (2007)

    Google Scholar 

  12. Fernandez, E.B., et al.: The secure three-tier architecture pattern. In: 2008 International Conference on Complex, Intelligent and Software Intensive Systems, pp. 555–560. IEEE (2008)

    Google Scholar 

  13. Singh, S., Rai, R.K.: A review report on security threats on database. Int. J. Comput. Sci. Inf. Technol. 5(3), 3215–3219 (2014)

    Google Scholar 

  14. Sarmah, S.: Database security–threats and prevention. IJCTT, 67(5), 46–50 (2019)

    Google Scholar 

  15. Al-Sayid, N.A., Aldlaeen, D.: Database security threats: a survey study. In: 2013 5th International Conference on Computer Science and Information Technology, pp. 60–64. IEEE (2013)

    Google Scholar 

  16. Poltavtseva, M.A., Zegzhda, D.P., Kalinin, M.O.: Big data management system security threat model. Autom. Control Comput. Sci. 53(8), 903–913 (2019). https://doi.org/10.3103/S0146411619080261

    Article  Google Scholar 

  17. Vlasova, O.A., Vasilyeva, A.S.: Protection and security of the database. Reshetnevskie readings, no. 21, p. 2 (2017)

    Google Scholar 

  18. Mousa, A., Karabatak, M., Mustafa, T.: Database security threats and challenges. In: 2020 8th International Symposium on Digital Forensics and Security (ISDFS), pp. 1–5. IEEE (2020)

    Google Scholar 

  19. Kotenko, I., Saenko, I., Kushnerevich, A.: Parallel big data processing system for security monitoring in internet of things networks. J. Wirel. Mobile Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 8(4), 60–74 (2017). https://doi.org/10.22667/JOWUA.2017.12.31.060

  20. Baldi, G., et al.: Session-dependent usage control for big data. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 76–92 (2020). https://doi.org/10.22667/JISIS.2020.08.31.076

  21. Parno, B., et al.: Pinocchio: nearly practical verifiable computation. In: 2013 IEEE Symposium on Security and Privacy, pp. 238–252. IEEE (2013)

    Google Scholar 

  22. Wahby, R.S., et al.: Doubly-efficient zkSNARKs without trusted setup. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 926–943. IEEE (2018)

    Google Scholar 

  23. Bünz, B., et al.: Bulletproofs: short proofs for confidential transactions and more. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 315–334. IEEE (2018)

    Google Scholar 

  24. Gennaro, R., et al.: Lattice-based zk-SNARKs from square span programs. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 556–573 (2018)

    Google Scholar 

  25. Baum, C., Bootle, J., Cerulli, A., del Pino, R., Groth, J., Lyubashevsky, V.: Sub-linear lattice-based zero-knowledge arguments for arithmetic circuits. In: Shacham, H., Boldyreva, A. (eds.) Advances in Cryptology – CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II, pp. 669–699. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-96881-0_23

    Chapter  Google Scholar 

  26. Ames, S., et al.: Ligero: lightweight sublinear arguments without a trusted setup. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2087–2104 (2017)

    Google Scholar 

  27. Ben-Sasson, E., et al.: Scalable, transparent, and post-quantum secure computational integrity. IACR Cryptol. ePrint Arch, vol. 2018, p. 46 (2018)

    Google Scholar 

  28. Ben-Sasson, E., Chiesa, A., Riabzev, M., Spooner, N., Virza, M., Ward, N.: Aurora: transparent succinct arguments for R1CS. In: Ishai, Y., Rijmen, V. (eds.) Advances in Cryptology – EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part I, pp. 103–128. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17653-2_4

    Chapter  Google Scholar 

  29. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303–332 (1999)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maria A. Poltavtseva .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aleksandrova, E.B., Poltavtseva, M.A., Shmatov, V.S. (2022). Ensuring the Big Data Integrity Through Verifiable Zero-Knowledge Operations. In: You, I., Kim, H., Youn, TY., Palmieri, F., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2021. Communications in Computer and Information Science, vol 1544. Springer, Singapore. https://doi.org/10.1007/978-981-16-9576-6_15

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-9576-6_15

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-9575-9

  • Online ISBN: 978-981-16-9576-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics