Abstract
In order to reduce data maintenance overhead, more and more enterprises outsource their data to the cloud storage, which provides flexible and on-demand storage service for companies. Data outsourcing also brings a lot of security problems, of which query integrity is a critical issue to be resolved. Current research mainly focuses on how to ensure correctness and completeness of the query integrity and pays little attention to freshness verification of query integrity. In this paper, we propose a scheme called MAC Chain for users to verify that their query results are correct, complete and fresh. Experiments show that our scheme does not only have a better performance but also support freshness verification.
Article PDF
Avoid common mistakes on your manuscript.
References
Armbrust M, Fox A, Griffith R, et al. A view of cloud computing[J]. Communications of the ACM. 53(4) (2010) 50–58.
S Subashini and V Kavitha. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications. 34(1) (2011) 1–11.
Deng-Guo Feng, Min Zhang, Yan Zhang, and Zhen Xu. Study on cloud computing security. Journal of Software. 22(1) (2011) 71–83.
S Ramgovind, Mariki M Eloff, and E Smith. The management of security in cloud computing. In Information Security for South Africa (ISSA). 2010, pp. 1–7.
Ralph C Merkle. A certified digital signature. In Advances in Cryptologył CRYPTO89 Proceedings. Springer. (1990) 218–238.
HweeHwa Pang and K-L Tan. Authenticating query results in edge computing. In Data Engineering, 2004. Proceedings. 20th International Conference. pp. 560–571.
Feifei Li, Marios Hadjieleftheriou, George Kollios, and Leonid Reyzin. Dynamic authenticated index structures for outsourced databases. In Proceedings of the 2006 ACM SIGMOD international conference on Management of data. (2006) pp. 121–132.
Goodrich, Michael T., Roberto Tamassia, and Nikos Triandopoulos. Super-efficient verification of dynamic outsourced databases. Topics in Cryptology–CT-RSA 2008. Springer Berlin Heidelberg.(2008). 407–424.
Tao Wen, Gang Sheng, Quan Guo, and Sheng Guo-Jun. Query results authentication of outsourced append-only databases. Journal of Computer Research and Development, 49(10) (2012) 2077–2085.
HweeHwa Pang, Arpit Jain, Krithi Ramamritham, and Kian-Lee Tan.Verifying completeness of relational query results in data publishing.In Proceedings of the 2005 ACM SIGMOD international conference on Management of data, pages 407–418. ACM, 2005
Narasimha, M., & Tsudik, G. DSAC: integrity for outsourced databases with signature aggregation and chaining. In Proceedings of the 14th ACM international conference on Information and knowledge management (ACM). pp. 235–236.
Zhang Min, Hong Cheng, and Chen Chi. Server transparent query authentication of outsourced database [J]. Journal of Computer Research and Development. (2010) 1:028
Ghasemi, Simin Noferesti, Morteza, et al. Correctness verification in database outsourcing: A trust-based fake tuples approach. Information Systems Security.( Springer) pp. 343–351.
Gang Sheng, Tao Wen, Quan Guo and Ying Yin. Verifying Correctness of Inner Product of Vectors in Cloud Computing. Proceedings of the 2013 international workshop on Security in cloud computing.(ACM, 2013) PP. 61–68.
Gang Sheng, Tao Wen, Quan Guo, and Ying Yin. Privacy Preserving Inner Product of Vectors in Cloud Computing. International Journal of Distributed Sensor Networks, 2014.
Stavros Papadopoulos, Yin Yang, and Dimitris Papadias. Cads: Continuous authentication on data streams. In Proceedings of the 33rd international conference on Very large data bases.(VLDB Endowment, 2007) pp. 135–146.
Min Xie, Haixun Wang, Jian Yin, and Xiaofeng Meng. Providing freshness guarantees for outsourced databases. In Proceedings of the 11th international conference on Extending database technology:Advances in database technology,( ACM, 2008.) pp 323–332.
Hugo Krawczyk, Ran Canetti, and Mihir Bellare. Hmac: Keyed-hashing for message authentication. 1997.
Bart Preneel. Cryptographic hash functions. European Transactions on Telecommunications. 5(4) (1994) 431–448.
M. Bellare, O. Goldreich, and S. Goldwasser. Incremental cryptography and application to virus protection. In 27th Annual Symposium of Theory of Computing, 1995.
Author information
Authors and Affiliations
Rights and permissions
This is an open access article under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
About this article
Cite this article
Hong, J., Wen, T., Guo, Q. et al. Query Integrity Verification based-on MAC Chain in Cloud Storage. Int J Netw Distrib Comput 2, 241–249 (2014). https://doi.org/10.2991/ijndc.2014.2.4.5
Published:
Issue Date:
DOI: https://doi.org/10.2991/ijndc.2014.2.4.5