Skip to main content

A New Query Integrity Verification Method for Encrypted Data in Database Outsourcing

  • Conference paper
Advanced Multimedia and Ubiquitous Engineering

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 352))

  • 1614 Accesses

Abstract

In database outsourcing, two issues of data security emerge: data confidentiality and data integrity. Existing data transformation schemes were widely studied for preserving data confidentiality, but they are vulnerable to data leakage problem because they do not consider data distribution when encrypting data. Meanwhile, query authentication schemes verifying data integrity, suffer from transmission overhead for verification data. In this paper, we propose a privacy-aware query authentication scheme which guarantees the data confidentiality and the query result integrity of sensitive data. To solve the original data leakage problem, we propose a bitmap-based data transformation scheme with anchor selection based on data distribution. Also, we devise a query result authentication index that stores an encrypted signature for each anchor so that it can reduce the amount of auditing data. Through performance evaluation, we show that our scheme outperforms the state-of-the-art method in terms of query processing time and verification overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Yiu, M.L., Assent, I., Jensen, C.S., Kalnis, P.: Outsourced similarity search on metric data assets. IEEE Trans. on Knowledge and Data Engineering 24(2), 338–352 (2012)

    Article  Google Scholar 

  2. Sacharidis, D., Mouratidis, K., Papadias, D.: k-Anonymity in the Presence of External Databases. IEEE Transactions on Knowledge and Data Engineering (2010)

    Google Scholar 

  3. Wang, J., et al.: Bucket-based authentication for outsourced databases. Concurrency and Computation: Practical and Experience (2010)

    Google Scholar 

  4. Mykletun, E., Narasimha, M., Tsudik, G.: Authentiacation and integrity in outsourced databases. Journal ACM Transactions on Storage (TOS) TOS 2(2) (2006)

    Google Scholar 

  5. Hore, B., et al.: Secure multidimensional range queries over outsourced data. The International Journal on Very Large Data Bases 21(3) (2012)

    Google Scholar 

  6. Balpande, S., et al.: Data integrity and confidentiality in outsourced database. In: International Conference & Workshop on Recent Trends in Technology (2012)

    Google Scholar 

  7. Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Miyoung Jang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jang, M., Yoon, M., Song, Y., Chang, JW. (2015). A New Query Integrity Verification Method for Encrypted Data in Database Outsourcing. In: Park, J., Chao, HC., Arabnia, H., Yen, N. (eds) Advanced Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering, vol 352. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47487-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-47487-7_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-47486-0

  • Online ISBN: 978-3-662-47487-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics