Verifiable Auditing for Outsourced Database in Cloud Computing

被引:139
作者
Wang, Jianfeng [1 ]
Chen, Xiaofeng [1 ]
Huang, Xinyi [2 ]
You, Ilsun [3 ]
Xiang, Yang [4 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian, Peoples R China
[2] Fujian Normal Univ, Sch Math & Comp Sci, Fuzhou 350000, Fujian, Peoples R China
[3] Soon Chun Hyang Univ, Dept Informat Secur Engn, Asan 336745, Chungnam Do, South Korea
[4] Deakin Univ, Sch Informat Technol, Burwood, Vic, Australia
基金
国家教育部博士点专项基金资助; 中国国家自然科学基金; 澳大利亚研究理事会;
关键词
Integrity auditing; database encryption; outsourcing computation; cloud computing; VERIFICATION;
D O I
10.1109/TC.2015.2401036
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of database outsourcing enables the data owner to delegate the database management to a cloud service provider (CSP) that provides various database services to different users. Recently, plenty of research work has been done on the primitive of outsourced database. However, it seems that no existing solutions can perfectly support the properties of both correctness and completeness for the query results, especially in the case when the dishonest CSP intentionally returns an empty set for the query request of the user. In this paper, we propose a new verifiable auditing scheme for outsourced database, which can simultaneously achieve the correctness and completeness of search results even if the dishonest CSP purposely returns an empty set. Furthermore, we can prove that our construction can achieve the desired security properties even in the encrypted outsourced database. Besides, the proposed scheme can be extended to support the dynamic database setting by incorporating the notion of verifiable database with updates.
引用
收藏
页码:3293 / 3303
页数:11
相关论文
共 41 条
[1]  
[Anonymous], 2005, Internet Mathematics, DOI DOI 10.1080/15427951.2004.10129096
[2]  
Atallah MJ, 2001, ADV COMPUT, V54, P215
[3]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[4]  
Benabbas S, 2011, LECT NOTES COMPUT SC, V6841, P111, DOI 10.1007/978-3-642-22792-9_7
[5]   Selective and authentic third-party distribution of XML documents [J].
Bertino, E ;
Carminati, B ;
Ferrari, E ;
Thuraisingham, B ;
Gupta, A .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (10) :1263-1278
[6]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[7]   Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility [J].
Buyya, Rajkumar ;
Yeo, Chee Shin ;
Venugopal, Srikumar ;
Broberg, James ;
Brandic, Ivona .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (06) :599-616
[8]  
Catalano D, 2013, LECT NOTES COMPUT SC, V7778, P55, DOI 10.1007/978-3-642-36362-7_5
[9]  
Chen X., 2014, IEEE T DEPENDABLE SE
[10]  
Chen XF, 2014, LECT NOTES COMPUT SC, V8712, P148, DOI 10.1007/978-3-319-11203-9_9