Abstract
In database outsourcing, two issues of data security emerge: data confidentiality and data integrity. Existing data transformation schemes were widely studied for preserving data confidentiality, but they are vulnerable to data leakage problem because they do not consider data distribution when encrypting data. Meanwhile, query authentication schemes verifying data integrity, suffer from transmission overhead for verification data. In this paper, we propose a privacy-aware query authentication scheme which guarantees the data confidentiality and the query result integrity of sensitive data. To solve the original data leakage problem, we propose a bitmap-based data transformation scheme with anchor selection based on data distribution. Also, we devise a query result authentication index that stores an encrypted signature for each anchor so that it can reduce the amount of auditing data. Through performance evaluation, we show that our scheme outperforms the state-of-the-art method in terms of query processing time and verification overhead.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Yiu, M.L., Assent, I., Jensen, C.S., Kalnis, P.: Outsourced similarity search on metric data assets. IEEE Trans. on Knowledge and Data Engineering 24(2), 338–352 (2012)
Sacharidis, D., Mouratidis, K., Papadias, D.: k-Anonymity in the Presence of External Databases. IEEE Transactions on Knowledge and Data Engineering (2010)
Wang, J., et al.: Bucket-based authentication for outsourced databases. Concurrency and Computation: Practical and Experience (2010)
Mykletun, E., Narasimha, M., Tsudik, G.: Authentiacation and integrity in outsourced databases. Journal ACM Transactions on Storage (TOS) TOSÂ 2(2) (2006)
Hore, B., et al.: Secure multidimensional range queries over outsourced data. The International Journal on Very Large Data Bases 21(3) (2012)
Balpande, S., et al.: Data integrity and confidentiality in outsourced database. In: International Conference & Workshop on Recent Trends in Technology (2012)
Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jang, M., Yoon, M., Song, Y., Chang, JW. (2015). A New Query Integrity Verification Method for Encrypted Data in Database Outsourcing. In: Park, J., Chao, HC., Arabnia, H., Yen, N. (eds) Advanced Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering, vol 352. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47487-7_10
Download citation
DOI: https://doi.org/10.1007/978-3-662-47487-7_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-47486-0
Online ISBN: 978-3-662-47487-7
eBook Packages: EngineeringEngineering (R0)