Skip to main content

Encrypted Data Group Authentication for Outsourced Databases

  • Conference paper
  • First Online:
Ubiquitous Computing Application and Wireless Sensor

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 331))

  • 1575 Accesses

Abstract

Cloud computing has been spotlighted as a new paradigm of database management system. However, privacy needs to be preserved for databases that are valuable and sensitive against unauthorized accesses. For this, two issues of data security, including data confidentiality and query result integrity, become major concerns for users. Existing bucket-based data authentication methods have problems of data disclosure and transmission overhead, due to the unsophisticated data grouping strategy. In this paper, we propose a privacy-aware query authentication index which guarantees data confidentiality and query result integrity for users. We privately partition a spatial database into small groups by using periodic function and generate a signature of each group. The group signature is used to check the correctness and completeness of outsourced data when answering a range query to users. Through performance evaluation, it is shown that proposed method outperforms the existing method in terms of range query processing time up to 3 times.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. FIP Standard (2001) Advanced encryption standard (AES). National Institute of Standards and Technology (NIST)

    Google Scholar 

  2. Chow CY, Mokbel MF, Liu X (2011) Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica 15(2):351–380

    Article  Google Scholar 

  3. Kerr S, Krkpatrick MS, Bertino E (2010) PEAR: a hardware based protocol authentication system. In: Proceedings of the 3rd ACM SIGSPATIAL international workshop on security and privacy in GIS and LBS, pp 18–25

    Google Scholar 

  4. Wang J et al (2010) Bucket-based authentication for outsourced databases. Concurrency Comput Pract Experience 22(9):1160–1180

    Google Scholar 

  5. Mykletun E, Narasimha M, Tsudik G (2004) Signature bouquets: immutability for aggregated/condensed signatures. In: European symposium on research in computer security (ESORICS), pp 160–176

    Google Scholar 

  6. Mykletun E, Narasimha M, Tsudik G (2006) Authentication and integrity in outsourced databases. J ACM Trans Storage (TOS) 2(2):107–138

    Google Scholar 

  7. Merkle RC (1990) A certified digital signature. Advances in cryptology—CRYPTO’89 proceedings. Springer, New York, pp 218–238

    Google Scholar 

  8. Narasimha M, Tsudik G (2005) DSAC: integrity for outsourced databases with signature aggregation and chaining. In: Proceedings of the 14th ACM international conference on information and knowledge management, ACM, New york, pp 235–236

    Google Scholar 

  9. Sacharidis D, Mouratidis K, Papadias D (2010) k-Anonymity in the presence of external databases. IEEE Trans Knowl Data Eng 22(3):392–403

    Article  Google Scholar 

  10. Yang Y, Papadias D, Papadopoulos S, Kalnis P (2009) Authenticated join processing in outsourced databases. In: ACM SIGMOD international conference on management of data, ACM, New york, pp 5–18

    Google Scholar 

  11. Liu D, Wang S, (2012) Query encrypted databases practically. In: Proceedings of the ACM conference on computer and communications security, ACM, New York, pp 1049–1051

    Google Scholar 

  12. Hore B et al (2012) Secure multidimensional range queries over outsourced data. Int J Very Large Data Bases 21(3):333–358

    Article  Google Scholar 

  13. Balpande S et al (2012) Data integrity and confidentiality in outsourced database. In: International conference and workshop on recent trends in technology, (TCET)

    Google Scholar 

  14. Devanbu P, Gertz M, Martel C, Stubblebine S (2003) Authentic data publication over the internet. J Comput Secur 11(3):291–314

    Google Scholar 

  15. Hacigumus H, Iyer B, Li C, Mehrotra S, (2002) Executing SQL over encrypted data in the database service provider model. ACM SIGMOD, New York, pp 216–227

    Google Scholar 

  16. Hore B, Mehrotra S, Tsudik G (2004) A privacy-preserving index for range queries. In: Proceedings of the 30th international conference on very large data bases-Volume 30, VLDB Endowment, pp 720–731

    Google Scholar 

  17. Wang J, Du X (2008) A secure multi-dimensional partition based index in DAS. Progress in WWW research and development. Springer, Heidelberg, pp 319–330

    Google Scholar 

  18. Wang C, Ku W, (2012) Efficient evaluation of skyline queries in wireless data broadcast environments. In: Proceedings of the 20th international conference on advances in geographic information systems, ACM, New York, pp 442–445

    Google Scholar 

  19. Rivest R, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126

    Article  MATH  MathSciNet  Google Scholar 

  20. Theodoridis Y, Silva J, Nascimento M (1999) On the generation of spatiotemporal datasets. Adv spat databases. Springer. Heidelberg, pp 147–164

    Google Scholar 

Download references

Acknowledgments

This research was supported by Basic Science Research program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (grant number 2013010099)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jae-Woo Chang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Jang, M., Jo, A., Chang, JW. (2015). Encrypted Data Group Authentication for Outsourced Databases. In: Park, J., Pan, Y., Chao, HC., Yi, G. (eds) Ubiquitous Computing Application and Wireless Sensor. Lecture Notes in Electrical Engineering, vol 331. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-9618-7_74

Download citation

  • DOI: https://doi.org/10.1007/978-94-017-9618-7_74

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-017-9617-0

  • Online ISBN: 978-94-017-9618-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics