Abstract
Information from databases is exposed to threats at all stages of its existence: from recording and storing in the database to processing and returning to the user. Big Data systems combine multiple DBMSs and databases. The problem of data integrity is the most acute in them. The article describes an approach to control the integrity of Big Data during their processing, based on verifiable zero knowledge operations. It can be applied to various complex systems containing heterogeneous Big Data databases. The proposed approach implements prospective data integrity protection against existing and hypothetical future threats.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Goddijn, I., Kouns, J.: 2020 Q1 Report Data Breach QuickView. Risk Based Security (2020)
Anada, H.: Decentralized multi-authority anonymous authentication for global identities with non-interactive proofs. J. Internet Serv. Inf. Secur. (JISIS) 10(4), 23–37 (2020). https://doi.org/10.22667/JISIS.2020.11.30.023
Duong, D.H., Susilo W., Trinh V.C.: Wildcarded identity-based encryption with constant-size ciphertext and secret key. J. Wirel. Mobile Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(2), pp. 74–86 (2020). https://doi.org/10.22667/JOWUA.2020.06.30.074
Dutta, P., Susilo, W., Duong, D.H., Baek, J., Roy, P.S.: Identity-based unidirectional proxy re-encryption and re-signature in standard model: lattice-based constructions. J. Int. Serv. Inf. Secur. (JISIS) 10(4), 1–22 (2020). https://doi.org/10.22667/JISIS.2020.11.30.001
Nowaczewski, S., Mazurczyk, W.: Securing future internet and 5G using customer edge switching using DNSCrypt and DNSSEC. J. Wirel. Mobile Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(3), 87–106 (2020). https://doi.org/10.22667/JOWUA.2020.09.30.087
Wong, S.K., Yiu, S.M.: Location spoofing attack detection with pre-installed sensors in mobile devices. J. Wirel. Mobile Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 16–30 (2020). https://doi.org/10.22667/JOWUA.2020.12.31.016
Thuraisingham, B.: Database security: past, present, and future. In: 2015 IEEE International Congress on Big Data, pp. 772–774. IEEE (2015)
Poltavtseva, M.A.: Evolution of data management systems and their security. In: Proceedings - 2019 International Conference on Engineering Technologies and Computer Science: Innovation and Application, EnT 2019, pp. 25–29 (2019). https://doi.org/10.1109/EnT.2019.00010
Poltavtsev, A.A., Khabarov, A.R., Selyankin, A.O.: Inference attacks and information security in databases. Autom. Control. Comput. Sci. 54(8), 829–833 (2020). https://doi.org/10.3103/S0146411620080271
Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression (1998)
Machanavajjhala, A., et al.: l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data (TKDD), 1(1), 3-es (2007)
Fernandez, E.B., et al.: The secure three-tier architecture pattern. In: 2008 International Conference on Complex, Intelligent and Software Intensive Systems, pp. 555–560. IEEE (2008)
Singh, S., Rai, R.K.: A review report on security threats on database. Int. J. Comput. Sci. Inf. Technol. 5(3), 3215–3219 (2014)
Sarmah, S.: Database security–threats and prevention. IJCTT, 67(5), 46–50 (2019)
Al-Sayid, N.A., Aldlaeen, D.: Database security threats: a survey study. In: 2013 5th International Conference on Computer Science and Information Technology, pp. 60–64. IEEE (2013)
Poltavtseva, M.A., Zegzhda, D.P., Kalinin, M.O.: Big data management system security threat model. Autom. Control Comput. Sci. 53(8), 903–913 (2019). https://doi.org/10.3103/S0146411619080261
Vlasova, O.A., Vasilyeva, A.S.: Protection and security of the database. Reshetnevskie readings, no. 21, p. 2 (2017)
Mousa, A., Karabatak, M., Mustafa, T.: Database security threats and challenges. In: 2020 8th International Symposium on Digital Forensics and Security (ISDFS), pp. 1–5. IEEE (2020)
Kotenko, I., Saenko, I., Kushnerevich, A.: Parallel big data processing system for security monitoring in internet of things networks. J. Wirel. Mobile Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 8(4), 60–74 (2017). https://doi.org/10.22667/JOWUA.2017.12.31.060
Baldi, G., et al.: Session-dependent usage control for big data. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 76–92 (2020). https://doi.org/10.22667/JISIS.2020.08.31.076
Parno, B., et al.: Pinocchio: nearly practical verifiable computation. In: 2013 IEEE Symposium on Security and Privacy, pp. 238–252. IEEE (2013)
Wahby, R.S., et al.: Doubly-efficient zkSNARKs without trusted setup. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 926–943. IEEE (2018)
Bünz, B., et al.: Bulletproofs: short proofs for confidential transactions and more. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 315–334. IEEE (2018)
Gennaro, R., et al.: Lattice-based zk-SNARKs from square span programs. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 556–573 (2018)
Baum, C., Bootle, J., Cerulli, A., del Pino, R., Groth, J., Lyubashevsky, V.: Sub-linear lattice-based zero-knowledge arguments for arithmetic circuits. In: Shacham, H., Boldyreva, A. (eds.) Advances in Cryptology – CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II, pp. 669–699. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-96881-0_23
Ames, S., et al.: Ligero: lightweight sublinear arguments without a trusted setup. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2087–2104 (2017)
Ben-Sasson, E., et al.: Scalable, transparent, and post-quantum secure computational integrity. IACR Cryptol. ePrint Arch, vol. 2018, p. 46 (2018)
Ben-Sasson, E., Chiesa, A., Riabzev, M., Spooner, N., Virza, M., Ward, N.: Aurora: transparent succinct arguments for R1CS. In: Ishai, Y., Rijmen, V. (eds.) Advances in Cryptology – EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part I, pp. 103–128. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17653-2_4
Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303–332 (1999)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Aleksandrova, E.B., Poltavtseva, M.A., Shmatov, V.S. (2022). Ensuring the Big Data Integrity Through Verifiable Zero-Knowledge Operations. In: You, I., Kim, H., Youn, TY., Palmieri, F., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2021. Communications in Computer and Information Science, vol 1544. Springer, Singapore. https://doi.org/10.1007/978-981-16-9576-6_15
Download citation
DOI: https://doi.org/10.1007/978-981-16-9576-6_15
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-9575-9
Online ISBN: 978-981-16-9576-6
eBook Packages: Computer ScienceComputer Science (R0)