access icon free Authenticating multi-dimensional query results in outsourced database

In the outsourced database model, the third-party server provides query services to users on behalf of the data owner. However, the service provider may be unreliable or susceptible to attacks. The service provider can also produce inauthentic or incomplete query results. An authentication scheme for multi-dimensional data is proposed in the present study to investigate this problem. The authors introduce a new concept of tower head node based on the k-dimensional skip list and use it to construct a new authenticated data structure. This structure supports both multi-dimensional range query and dynamic maintenance. They also show how to verify the authenticity and completeness of query results on multi-dimensional datasets in the outsourced database model. Moreover, this structure can be fully outsourced, thus the service provider can perform the entire maintenance, which is crucial for users with limited computational resources. The proof of security and the evaluation of experiment demonstrate that the scheme is secure and outperforms previous schemes in terms of the construction cost, proof size, query time, verification time and update cost.

Inspec keywords: data structures; database management systems; query processing

Other keywords: construction cost; outsourced database model; multidimensional data; multidimensional query result authentication; dynamic maintenance; proof size; verification time; query services; k-dimensional skip list; query time; tower head node; authenticated data structure; update cost; third-party server

Subjects: File organisation; Database management systems (DBMS)

References

    1. 1)
      • 20. Xie, M., Wang, H.X., Yin, J., et al: ‘Providing freshness guarantees for outsourced databases’. Proc. of Int. Conf. on Extending Database Technology, Nantes, France, March 2008, pp. 323332.
    2. 2)
      • 14. Erway, C., Kupcu, A., Papamanthou, C., et al: ‘Dynamic provable data possession’. Proc. of Int. Conf. on ACM on Computer and Communications Security, Chicago, USA, November 2009, pp. 213222.
    3. 3)
      • 27. Devanbu, P., Gertz, M., Martel, C., et al: ‘Authentic data publication over the internet’, J. Comput. Secur., 2003, 11, (3), pp. 291314.
    4. 4)
    5. 5)
      • 2. Hsiao, H.C., Lin, Y.H., Studer, A., et al: ‘A study of user-friendly hash comparison schemes’. Proc. of Int. Conf. on Computer Security Applications, Hawaii, USA, December 2009, pp. 105114.
    6. 6)
    7. 7)
      • 30. Yang, Y., Papadopoulos, S., Papadias, D., et al: ‘Spatial outsourcing for location-based services’. Proc. of Int. Conf. on Data Engineering, Cancún, México, April 2008, pp. 10821091.
    8. 8)
      • 9. Di Battista, G., Palazzi, B.: ‘Authenticated relational tables and authenticated skip lists’. Proc. of Int. Conf. on IFIP WG 11.3 Working on Data and Applications Security, CA, USA, July 2007, pp. 3146.
    9. 9)
    10. 10)
      • 1. Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: ‘Dynamic authenticated index structures for outsourced databases’. Proc. of Int. Conf. on ACM SIGMOD on Management of Data, Chicago, Illinois, USA, June 2006, pp. 121132.
    11. 11)
    12. 12)
    13. 13)
      • 7. Goodrich, M., Tamassia, R.: ‘Efficient authenticated dictionaries with skip lists and commutative hashing’ (Johns Hopkins Information Security Institute, 2001), pp. 114.
    14. 14)
    15. 15)
      • 3. Wang, X.M., Yuan, D.B.: ‘A query verification scheme for dynamic outsourced databases’, J. Comput., 2012, 7, (1), pp. 156160.
    16. 16)
    17. 17)
      • 26. Merkle, R.C.: ‘A certified digital signature’. Proc. of Int. Conf. on Advances in Cryptology, London, UK, August 1989, pp. 218238.
    18. 18)
      • 29. Cheng, W., Tan, K.L.: ‘Query assurance verification for outsourced multi-dimensional databases’, J. Comput. Secur., 2009, 17, (1), pp. 101126.
    19. 19)
    20. 20)
      • 10. Heitzmann, A., Palazzi, B., Papamanthou, C., et al: ‘Efficient integrity checking of untrusted network storage’. Proc. of Int. Conf. on ACM Workshop on Storage Security and Survivability, Alexandria, VA, USA, October 2008, pp. 4353.
    21. 21)
      • 11. Ateniese, G., Burns, R., Curtmola, R., et al: ‘Provable data possession at untrusted stores’. Proc. of Int. Conf. on ACM on Computer and Communications Security, Alexandria, VA, USA, October 2007, pp. 598609.
    22. 22)
      • 12. Juels, A., Burton, J., Kaliski, S.: ‘PoRs: proofs of retrievability for large files’. Proc. of Int. Conf. on ACM on Computer and Communications Security, Alexandria, VA, USA, October 2007, pp. 584597.
    23. 23)
    24. 24)
      • 33. Nickerson, B.G.: ‘Skip list data structures for multidimensional data’ (University of Maryland Institute for Advanced Computer Studies, 1994), pp. 139.
    25. 25)
      • 19. Xie, M., Wang, H., Jian, Y., et al: ‘Integrity auditing of outsourced data’. Proc. of Int. Conf. on Very Large Data Bases, Austria, September 2007, pp. 782793.
    26. 26)
    27. 27)
    28. 28)
      • 21. Wang, H., Yin, J., Perng, C., et al: ‘Dual encryption for query integrity assurance’. Proc. of Int. Conf. on ACM Information and Knowledge Management, Napa Valley, CA, October 2008, pp. 863872.
    29. 29)
      • 17. Tajuddin, Md., China Busi, K.: ‘An enhanced dynamic auditing protocol in cloud computing’, Int. J. Eng. Trends Technol., 2013, 4, (7), pp. 31733176.
    30. 30)
    31. 31)
      • 24. De Capitani di Vimercati, S., Foresti, S., Jajodia, S., et al: ‘Integrity for distributed queries’. IEEE Conf. on Communications and Network Security, San Francisco, CA, USA, October 2014, pp. 19.
    32. 32)
      • 8. Wang, J., Du, X.Y.: ‘Skip list based authenticated data structure in DAS paradigm’. Proc. of Int. Conf. on Grid and Cooperative Computing, Lanzhou, China, August 2009, pp. 6975.
    33. 33)
      • 6. Wei, W., Yu, T., Xue, R.: ‘iBigTable: practical data integrity for bigtable in public cloud’. Proc. of Int. Conf. on ACM on Data and Application Security and Privacy, New York, USA, February 2013, pp. 341352.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2014.0408
Loading

Related content

content/journals/10.1049/iet-ifs.2014.0408
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading