Advertisement

Query Authentication over Cloud Data from Multiple Contributors

  • Ge Xie
  • Zhiyong Peng
  • Wei Song
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8709)

Abstract

As data stored in the cloud may encounter the malicious attack from the cloud service provider (CSP), to ensure data authenticity and integrity, it is necessary to authenticate the query results from CSP. However, most existing authentication methods focus on query over data from a single contributor in the outsourced database. This paper puts forward authentication method for query over data from multiple contributors in the cloud environment. The method can validate data from multiple contributors on only one authentication data structure (ADS) based on Merkle Hash Tree (MHT), which achieves low storage costs and high computational efficiency. Experimental results show that our mechanism can efficiently enable query authentication over cloud data from multiple contributors.

Keywords

cloud storage multiple contributors query authentication data security Merkle Hash Tree 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Fox, A., Griffith, R., et al.: Above the clouds: A berkeley view of cloudcomputing. Dept. Electrical Eng. and Comput. Sciences, University ofCalifornia, Berkeley, Tech. Rep. UCB/EECS, vol. 28 (2009)Google Scholar
  2. 2.
    Hacigümüs, H., Mehrotra, S., Iyer, B.R.: Providing Database as a Service. In: Proceedings of the 18th International Conference on Data Engineering, pp. 29–40 (2002)Google Scholar
  3. 3.
    Narasimha, M., Tsudik, G.: Authentication of outsourced databases using signature aggregation and chaining. In: Li Lee, M., Tan, K.-L., Wuwongse, V. (eds.) DASFAA 2006. LNCS, vol. 3882, pp. 420–436. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  4. 4.
    Pang, H., Jain, A., Ramamritham, K., et al.: Verifying completeness of relational query results in data publishing. In: Proceedings of ACM SIGMOD Conference (SIGMOD 2005), Baltimore, Maryland, USA (2005)Google Scholar
  5. 5.
    Mykletun, E., Narasimha, M., Tsudik, G.: Providing authentication and integrity in outsourced databases using Merkle hash trees. UCI-SCONCE Technical Report[R/OL] (2003), http://sconce.ics.uci.edu/das/MerkleODB.pdf
  6. 6.
    Li, F., Hadjieleftheriouz, M., Kolliosy, G., et al.: Dynamic authenticated index structures for outsourced databases. In: Proceedings of ACM SIGMOD Conference (SIGMOD 2006), Chicago, Illinois, USA (2006)Google Scholar
  7. 7.
    Cheng, W., Pang, H., Tan, K.-L.: Authenticating multi-dimensional query results in data publishing. In: Damiani, E., Liu, P. (eds.) Data and Applications Security 2006. LNCS, vol. 4127, pp. 60–73. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  8. 8.
    Yang, Y., Papadopoulos, S., Papadias, D., et al.: Authenticated indexing for outsourced spatial databases. VLDB Journal (2009)Google Scholar
  9. 9.
    Li, F., Hadjieleftheriouz, M., Kolliosy, G., et al.: Authenticated index structures for aggregation queries in outsourced databases, BUCS-TR-2006-011[R] (2006)Google Scholar
  10. 10.
    Sion, R.: Query execution assurance for outsourced databases. In: Proceedings of International Conference on Very Large Data Bases(VLDB 2005), Trondheim, Norway (2005)Google Scholar
  11. 11.
    Xie, M., Wang, H.J., Yin, J., et al.: Integrity auditing of outsourced data. In: Proceedings of International Conference on Very Large Data Bases(VLDB 2007), Vienna, Austria (2007)Google Scholar
  12. 12.
    Wang, H.J., Yin, J., Perng, C., et al.: Dual encryption for query integrity assurance. In: Proceedings of ACM Conference on Information and Knowledge Management (CIKM 2008), Napa Valley, California, USA (2008)Google Scholar
  13. 13.
    Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Ge Xie
    • 1
  • Zhiyong Peng
    • 1
  • Wei Song
    • 1
  1. 1.Computer SchoolWuhan UniversityWuhanChina

Personalised recommendations