Data Integrity Verification in Column-Oriented NoSQL Databases

被引:6
作者
Weintraub, Grisha [1 ]
Gudes, Ehud [2 ]
机构
[1] Open Univ, Dept Math & Comp Sci, Raanana, Israel
[2] Ben Gurion Univ Negev, Dept Comp Sci, Beer Sheva, Israel
来源
DATA AND APPLICATIONS SECURITY AND PRIVACY XXXII, DBSEC 2018 | 2018年 / 10980卷
关键词
Data integrity; Database outsourcing; NoSQL;
D O I
10.1007/978-3-319-95729-6_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data integrity in cloud databases is a topic that has received a much of attention from the research community. However, existing solutions mainly focus on the cloud providers that store data in relational databases, whereas nowadays many cloud providers store data in non-relational databases as well. In this paper, we focus on the particular family of non-relational databases-column-oriented stores, and present a protocol that will allow cloud users to verify the integrity of their data that resides on cloud databases of this type. We like our solution to be easily integrated with the existing real-world systems and therefore assume that we cannot modify the cloud; our protocol is implemented solely on the client side. We have implemented a prototype of our solution, that uses Cloud BigTable as a cloud database, and have evaluated its performance and correctness.
引用
收藏
页码:165 / 181
页数:17
相关论文
共 27 条
[1]  
Atikoglu Berk, 2012, Performance Evaluation Review, V40, P53, DOI 10.1145/2318857.2254766
[2]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[3]   Scalable SQL and NoSQL Data Stores [J].
Cattell, Rick .
SIGMOD RECORD, 2010, 39 (04) :12-27
[4]   Bigtable: A distributed storage system for structured data [J].
Chang, Fay ;
Dean, Jeffrey ;
Ghemawat, Sanjay ;
Hsieh, Wilson C. ;
Wallach, Deborah A. ;
Burrows, Mike ;
Chandra, Tushar ;
Fikes, Andrew ;
Gruber, Robert E. .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2008, 26 (02)
[5]  
Cooper NE, 2010, UNDER CONTROL: GOVERNANCE ACROSS THE ENTERPRISE, P143, DOI 10.1007/978-1-4302-1593-6_10
[6]  
Devanbu P., 2003, Journal of Computer Security, V11, P291
[7]   Crowdsourcing Systems on the World-Wide Web [J].
Doan, Anhai ;
Ramakrishnan, Raghu ;
Halevy, Alon Y. .
COMMUNICATIONS OF THE ACM, 2011, 54 (04) :86-96
[8]   Providing database as a service [J].
Hacigümüs, H ;
Iyer, B ;
Mehrotra, S .
18TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2002, :29-38
[9]  
Krawczyk Hugo, 1997, KEYED HASHING MESSAG
[10]   Will NoSQL Databases Live Up to Their Promise? [J].
Leavitt, Neal .
COMPUTER, 2010, 43 (02) :12-14