ABSTRACT
Highly dynamic map data play nowadays a crucial role in different application contexts. Their huge volume often enforces the data owner to outsource them to the cloud, becoming this way the client of analytical queries computed by the cloud. Therefore, the classical problem of query integrity, usually considered in the scenario of location-based services (LBS) over outsourced databases, arises also in this different scenario. This means that the data owner should have guarantees that the cloud response to a submitted query is correct, complete, and fresh. On the one hand, the considered setting simplifies the problem, because public verifiability is no longer required, but poses new challenges, such as supporting very efficient insertions and deletions and, consequently, effective guarantees for freshness. This paper studies this problem by proposing a lightweight message-authentication-code-based approach fulfilling the above requirements better than the approaches available in the literature, according to an analytical cost evaluation.
- Weiwei Cheng, HweeHwa Pang, and Kian-Lee Tan. 2006. Authenticating multidimensional query results in data publishing. In IFIP Annual Conference on Data and Applications Security and Privacy. Springer, 60--73.Google Scholar
- Ling Hu, Wei-Shinn Ku, Spiridon Bakiras, and Cyrus Shahabi. 2013. Spatial query integrity with voronoi neighbors. IEEE Transactions on Knowledge and Data Engineering 25, 4 (2013), 863--876.Google ScholarDigital Library
- Hugo Krawczyk, Ran Canetti, and Mihir Bellare. 1997. HMAC: Keyed-hashing for message authentication. (1997).Google Scholar
- Ralph C Merkle. 1989. A certified digital signature. In Advances in Cryptology---CRYPTO'89 Proceedings. Springer, 218--238.Google Scholar
- HweeHwa Pang, Arpit Jain, Krithi Ramamritham, and Kian-Lee Tan. 2005. Verifying completeness of relational query results in data publishing. In Proceedings of the 2005 ACM SIGMOD international conference on Management of data. 407--418.Google ScholarDigital Library
- Dimitrios Papadopoulos, Stavros Papadopoulos, and Nikos Triandopoulos. 2014. Taking authenticated range queries to arbitrary dimensions. In Proc. of the 2014 ACM SIGSAC Conference on Computer and Communications Security. 819--830.Google ScholarDigital Library
- Pierangela Samarati. 2014. Data security and privacy in the cloud. In International Conference on Information Security Practice and Experience. Springer, 28--41.Google ScholarDigital Library
- Yin Yang, Stavros Papadopoulos, Dimitris Papadias, and George Kollios. 2009. Authenticated indexing for outsourced spatial databases. The VLDB Journal 18, 3 (2009), 631--648.Google ScholarCross Ref
- B. Zhang, B. Dong, and W. H. Wang. 2019. Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey. IEEE Transactions on Knowledge and Data Engineering (2019), 1--1.Google Scholar
- Yupeng Zhang, Jonathan Katz, and Charalampos Papamanthou. 2015. IntegriDB: Verifiable SQL for outsourced databases. In Proc. of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 1480--1491.Google ScholarDigital Library
- Qingji Zheng, Shouhuai Xu, and Giuseppe Ateniese. 2012. Efficient query integrity for outsourced dynamic databases. In Proceedings of the 2012 ACM Workshop on Cloud computing security workshop. 71--82.Google ScholarDigital Library
Index Terms
- Integrity guarantees over highly dynamic outsourced map data
Recommendations
Efficient query integrity for outsourced dynamic databases
CCSW '12: Proceedings of the 2012 ACM Workshop on Cloud computing security workshopAs databases are increasingly outsourced to the cloud, data owners require various security assurances. This paper investigates one particular assurance, query integrity, by which a database querier (either the data owner or a third party) can verify ...
Outsourced Proofs of Retrievability
CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications SecurityProofs of Retrievability (POR) are cryptographic proofs that enable a cloud provider to prove that a user can retrieve his file in its entirety. POR need to be frequently executed by the user to ensure that their files stored on the cloud can be fully ...
New verifiable outsourced computation scheme for an arbitrary function
We study the construction of efficient verifiable outsourced computation for arbitrary functions. We improve previous verifiable outsourced computation schemes for arbitrary functions by using hybrid encryption based on fully homomorphic encryption and ...
Comments