Advertisement

Cluster Computing

, Volume 22, Supplement 3, pp 5185–5193 | Cite as

Verifiable algorithm for outsourced database with updating

  • Zhen Guo
  • Hui Li
  • Chunjie Cao
  • Zhengxi WeiEmail author
Article

Abstract

In cloud computing, by using the outsourcing technique, the clients can perform the complex tasks easily with the help of cloud computing. However, cloud service providers are usually untrusted, thus, the clients may lose the controllability of outsourced data. Therefore, it is important to guarantee the security of the outsourced data. In this paper, we focus on the security of outsourced database. A verification scheme for out-sourced database is proposed. In this scheme, the out-sourced data is disguised, and the cloud server cannot get the original data. If the cloud server returns dummy data (changed data, real data but not the required one), it will be detected by the clients easily. Furthermore, the clients can update the outsourced data, and a new proof will be generated to ensure the correctness of the data. The efficiency of data update is very high, and the computational cost of the client is low. This scheme is suitable for the resource-constrained devices, such as wearable devices.

Keywords

Verification Update Outsourced database 

Notes

Acknowledgements

This work was supported in part by the Natural Science Foundation of Hainan Province (Nos. 20156217, 20166217), National Natural Science Foundation of China (No. 61661019), the Major Science and Technology Project of Hainan Province (No. ZDKJ2016015), the Wisdom Tourism Research Base of Sichuan Province (No. ZHZ15-02), the Guangxi Key Laboratory of Cryptography and Information Security (No. GCIS201607).

References

  1. 1.
    Atallah, M.J., K. N, P., J.R, R., E.H, S.: Secure outsourcing of scientific computations. Adv. Comput. 54, 215–272 (2002)CrossRefGoogle Scholar
  2. 2.
    Backes, M., Fiore, D., Reischuk, R.M.: Verifiable delegation of computation on outsourced data. In: 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS’13, Berlin, Germany, November 4–8, 2013, pp. 863–874, (2013)Google Scholar
  3. 3.
    Beaver, D., Feigenbaum, J.: Hiding instances in multi-oracle queries. In: Proceedings of STAC’ 90, vol. 415, pp. 37–48. Springer, Berlin (1990)CrossRefGoogle Scholar
  4. 4.
    Beaver, D., Feigenbaum, J., Kilian, J., Rogaway, P.: Locally random reductions: improvements and applications. J. Cryptol. 10(1), 17–36 (1997)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Benabbas, S., Gennaro, R., Vahlis. Y.: Verifiable del-egation of computation over large datasets. In: Advances in Cryptology - CRYPTO 2011—Proceedings of the 31st Annual Cryptology Conference, pp. 111–131. Santa Barbara, CA, USA, 14–18 August 2011Google Scholar
  6. 6.
    Benjamin, D., Atallah, M.J.: Private and cheating-free outsourcing of algebraic computations. In: Sixth Annual Conference on Privacy, Security and Trust, PST, 2008, pp. 240–245. Springer, Fredericton, New Brunswick, Canada. October 2008Google Scholar
  7. 7.
    Blum, M., Kannan, S.: Designing programs that check their work. J. ACM 42(1), 269–291 (1995)CrossRefGoogle Scholar
  8. 8.
    Blum, M., Luby, M., Rubinfeld, R.: Self-testing/correcting with applications to numerical problems. J. Comput. Syst. Sci. 47(3), 549–595 (1993)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Theory of Cryptography, Proceedings of the 4th Theory of Cryptography Conference, TCC 2007, pp. 535–554. Amsterdam, The Netherlands, 21–24 February 2007Google Scholar
  10. 10.
    Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25(6), 599–616 (2009)CrossRefGoogle Scholar
  11. 11.
    Catalano, D., Fiore, D.: Vector commitments and their applications. In: Public-Key Cryptography—PKC 2013—Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, pp. 55–72. Nara, Japan, 26 February–1 March 2013CrossRefGoogle Scholar
  12. 12.
    Ding, Y., Xu, Z., Ye, J., Choo, K.K.R.: Secure outsourcing of modular exponentiations under single un-trused programme model. J. Comput. Syst. Sci. (2016)Google Scholar
  13. 13.
    Rosario, G., Craig, G., Bryan, P.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, pp. 465–482. Santa Barbara, CA, USA, 15–19 August 2010Google Scholar
  14. 14.
    Ma, D., Deng, R.H., Pang, H., Zhou, J.: Authenticating query results in data publishing. In: Information and Communications Security, Proceedings of the 7th Inter-national Conference, ICICS 2005, pp. 376–388. Beijing, China, 10–13 December 2005CrossRefGoogle Scholar
  15. 15.
    Pang, H., Jain, A., Ramamritham, K., Tan K.: Verifying completeness of relational query results in data publishing. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 407–418. Baltimore, Maryland, USA, 14–16 June 2005Google Scholar
  16. 16.
    Parno, B., Raykova, M., Vaikuntanathan V.: How to delegate and verify in public: verifiable computation from attribute-based encryption. In: Theory of Cryptography -Proceedings of 9th Theory of Cryptography Conference, TCC 2012, pp. 422–439. Taormina, Sicily, Italy, 19–21 March 2012CrossRefGoogle Scholar
  17. 17.
    Ye, J., Xu, Z., Ding, Y.: Secure outsourcing of modular exponentiations in cloud and cluster computing. Clust. Comput. 19(2), 811–820 (2016)CrossRefGoogle Scholar
  18. 18.
    Ye, J., Zhang, H., Fu, C.: Verifiable delegation of polynomials. Int. J. Netw. Secur. 18(2), 283–290 (2016)Google Scholar
  19. 19.
    Ye, J., Zhou, X., Xu, Z., Ding, Y.: Verifiable out-sourcing of high-degree polynomials and its application in keyword search. Int. Autom. Soft Comput. (2017). http://dx.doi.org/10.1080/10798587.2016.1267239
  20. 20.
    Yu, J., Wang, X., Gao, W.: Improvement and applications of secure outsourcing of scientific computations. J. Ambient Intell. Humaniz. Comput. 6(6), 763–772 (2015)CrossRefGoogle Scholar
  21. 21.
    Zhou, X., Ding, Y., Wang, Z., Li, X., Ye, J., Xu, Z.: Secure outsourcing algorithm of polynomials in cloud computing. In: The 28th International Conference on Software Engineering and Knowledge Engineering, SEKE 2016, pp. 46–51. Redwood City, San Francisco Bay, USA, 1–3 July 2016Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  1. 1.School of Network and Information SecurityXidian UniversityXi’anPeople’s Republic of China
  2. 2.College of Information Science & TechnologyHainan UniversityHainanPeople’s Republic of China
  3. 3.State Key Laboratory of Marine Resource Utilization in the South China SeaHaikouPeople’s Republic of China
  4. 4.School of Computer ScienceSichuan University of Science and EngineeringZigongPeople’s Republic of China
  5. 5.Guangxi Key Laboratory of Cryptography and Information SecurityGuilinPeople’s Republic of China

Personalised recommendations