Skip to main content
Top
Published in: Cluster Computing 3/2019

21-12-2017

Privacy protection and integrity verification of aggregate queries in cloud computing

Authors: Jun Hong, Tao Wen, Quan Guo, Zhengwang Ye, Ying Yin

Published in: Cluster Computing | Special Issue 3/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Outsourcing data to the cloud becomes a trend for the users to reduce database management and maintenance cost. However, storing data on the cloud brings many security problems. Data privacy and query authentication are two critical issues to be resolved. Specially, they are important to aggregate queries of cloud data. The data owner must keep the sensitive data hidden and only the aggregate result is revealed to the clients and cloud service provider. Furthermore, the client can ensure that the aggregate results are correct and complete. In this paper, we adopt multi-party computation to realize privacy-preserving aggregate computation in which at least t cloud servers can jointly calculate the aggregate results without gaining any knowledge of sensitive data. In addition, we introduce an authenticated structure, called PAAT, to provide query authentication for aggregate result. The experimental results show that our scheme is feasible and has good performance in practice.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 35(1), 1–11 (2011)CrossRef Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 35(1), 1–11 (2011)CrossRef
2.
go back to reference Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., et al.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)CrossRef Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., et al.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)CrossRef
3.
go back to reference Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)CrossRef Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)CrossRef
4.
5.
go back to reference Ramgovind, S., Eloff, M.M., Smith, E.: The management of security in cloud computing. In: Proceedings of the Information Security for South Africa (ISSA), 2010, pp. 1–7. IEEE (2010) Ramgovind, S., Eloff, M.M., Smith, E.: The management of security in cloud computing. In: Proceedings of the Information Security for South Africa (ISSA), 2010, pp. 1–7. IEEE (2010)
6.
go back to reference Zhao, Y., Yu, J.X., Wang, G., Chen, L., Wang, B., Yu, G.: Maximal subspace coregulated gene clustering. IEEE Trans. Knowl. Data Eng. 20(1), 83–98 (2007)CrossRef Zhao, Y., Yu, J.X., Wang, G., Chen, L., Wang, B., Yu, G.: Maximal subspace coregulated gene clustering. IEEE Trans. Knowl. Data Eng. 20(1), 83–98 (2007)CrossRef
7.
go back to reference Hacigum̈üş, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, pp. 216–227. ACM (2002) Hacigum̈üş, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, pp. 216–227. ACM (2002)
8.
go back to reference Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, pp. 563–574. ACM (2004) Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, pp. 563–574. ACM (2004)
9.
go back to reference Boldyreva, A., Chenette, N., Lee, Y., O’Neill, A.: Order-preserving symmetric encryption. In: Advances in Cryptology—EUROCRYPT 2009, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26–30, 2009, vol. 5479, pp. 224–241 (2009)CrossRef Boldyreva, A., Chenette, N., Lee, Y., O’Neill, A.: Order-preserving symmetric encryption. In: Advances in Cryptology—EUROCRYPT 2009, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26–30, 2009, vol. 5479, pp. 224–241 (2009)CrossRef
10.
go back to reference Mykletun, E., Tsudik, G.: Aggregation queries in the database-as-a-service model. In: Proceedings of the Data and Applications Security XX, pp. 89–103. Springer (2006) Mykletun, E., Tsudik, G.: Aggregation queries in the database-as-a-service model. In: Proceedings of the Data and Applications Security XX, pp. 89–103. Springer (2006)
11.
go back to reference Hacigumus, H., Iyer, B., Mehrotra, S.: Efficient execution of aggregation queries over encrypted databases. In: Lecture Notes in Computer Science. vol. 2973, pp. 125–136 (2004) Hacigumus, H., Iyer, B., Mehrotra, S.: Efficient execution of aggregation queries over encrypted databases. In: Lecture Notes in Computer Science. vol. 2973, pp. 125–136 (2004)
12.
go back to reference Thompson, B., Haber, S., Horne, W.G., Sander, T., Yao, D.: Privacy preserving computation and verification of aggregate queries on outsourced databases. In: Proceedings of the Privacy Enhancing Technologies, pp. 185–201. Springer (2009) Thompson, B., Haber, S., Horne, W.G., Sander, T., Yao, D.: Privacy preserving computation and verification of aggregate queries on outsourced databases. In: Proceedings of the Privacy Enhancing Technologies, pp. 185–201. Springer (2009)
13.
go back to reference Alzain, M.A., Li, A.S., Soh, B., Pardede, E.: Multi-cloud data management using Shamir’s secret sharing and quantum Byzantine agreement schemes. Int. J. Cloud Appl. Comput. 5(3), 35–52 (2015) Alzain, M.A., Li, A.S., Soh, B., Pardede, E.: Multi-cloud data management using Shamir’s secret sharing and quantum Byzantine agreement schemes. Int. J. Cloud Appl. Comput. 5(3), 35–52 (2015)
14.
go back to reference Emekci, F., Agrawal, D., Abbadi, A.E., Gulbeden, A.: Privacy preserving query processing using third parties. In: Proceedings of the 22nd International Conference on Data Engineering, 2006. ICDE’06. IEEE (2006) Emekci, F., Agrawal, D., Abbadi, A.E., Gulbeden, A.: Privacy preserving query processing using third parties. In: Proceedings of the 22nd International Conference on Data Engineering, 2006. ICDE’06. IEEE (2006)
16.
go back to reference Hadavi, M.A., Damiani, E., Jalili, R., Cimato, S., Ganjei, Z.: AS5: a secure searchable secret sharing scheme for privacy preserving database outsourcing. In: Data Privacy Management and Autonomous Spontaneous Security (2013) Hadavi, M.A., Damiani, E., Jalili, R., Cimato, S., Ganjei, Z.: AS5: a secure searchable secret sharing scheme for privacy preserving database outsourcing. In: Data Privacy Management and Autonomous Spontaneous Security (2013)
17.
go back to reference Haber, S., Horne, W.G., Sander, T., Yao, D.: Privacy-aware verification of aggregate queries on outsourced databases with applications to historic data integrity. In: Proceedings of the Privacy Enhancing Technologies (2009) Haber, S., Horne, W.G., Sander, T., Yao, D.: Privacy-aware verification of aggregate queries on outsourced databases with applications to historic data integrity. In: Proceedings of the Privacy Enhancing Technologies (2009)
18.
go back to reference Nath, S., Venkatesan, R.: Publicly verifiable grouped aggregation queries on outsourced data streams. Proceedings of the IEEE, International Conference on Data Engineering, pp. 517–528. IEEE (2013) Nath, S., Venkatesan, R.: Publicly verifiable grouped aggregation queries on outsourced data streams. Proceedings of the IEEE, International Conference on Data Engineering, pp. 517–528. IEEE (2013)
19.
go back to reference Zhuo, G., Jia, Q., Guo, L., Li, M., Li, P.: Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing. Proceedings of the IEEE INFOCOM 2016—the IEEE International Conference on Computer Communications, pp. 1–9. IEEE (2016) Zhuo, G., Jia, Q., Guo, L., Li, M., Li, P.: Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing. Proceedings of the IEEE INFOCOM 2016—the IEEE International Conference on Computer Communications, pp. 1–9. IEEE (2016)
20.
go back to reference Pang, H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying completeness of relational query results in data publishing. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 407–418. ACM (2005) Pang, H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying completeness of relational query results in data publishing. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 407–418. ACM (2005)
21.
go back to reference Narasimha, M., Tsudik, G.: Dsac: integrity for outsourced databases with signature aggregation and chaining. In: Proceedings of the 14th ACM International Conference on Information and Knowledge Management, pp. 235–236. ACM (2005) Narasimha, M., Tsudik, G.: Dsac: integrity for outsourced databases with signature aggregation and chaining. In: Proceedings of the 14th ACM International Conference on Information and Knowledge Management, pp. 235–236. ACM (2005)
22.
go back to reference Hong, J., Wen, T., Gu, Q., Sheng, G.: Query integrity verification based-on mac chain in cloud storage. In: Proceedings of the 2014 IEEE/ACIS 13th International Conference onComputer and Information Science (ICIS), pp. 125–129. IEEE (2014) Hong, J., Wen, T., Gu, Q., Sheng, G.: Query integrity verification based-on mac chain in cloud storage. In: Proceedings of the 2014 IEEE/ACIS 13th International Conference onComputer and Information Science (ICIS), pp. 125–129. IEEE (2014)
23.
go back to reference Min, Z., Cheng, H., Chi, C.: Server transparent query authentication of outsourced database. J. Comput. Res. Dev. 1, 028 (2010) Min, Z., Cheng, H., Chi, C.: Server transparent query authentication of outsourced database. J. Comput. Res. Dev. 1, 028 (2010)
24.
go back to reference Merkle, R.C.: A certified digital signature. In: Advances in CryptologyCRYPTO89 Proceedings, pp. 218–238. Springer (1990) Merkle, R.C.: A certified digital signature. In: Advances in CryptologyCRYPTO89 Proceedings, pp. 218–238. Springer (1990)
25.
go back to reference Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, pp. 121–132. ACM (2006) Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, pp. 121–132. ACM (2006)
26.
go back to reference Goodrich, M.T., Tamassia, R., Triandopoulos, N.: Super-efficient verification of dynamic outsourced databases. In Proceedings of the Topics in Cryptology–CT-RSA 2008, pp. 407–424. Springer (2008) Goodrich, M.T., Tamassia, R., Triandopoulos, N.: Super-efficient verification of dynamic outsourced databases. In Proceedings of the Topics in Cryptology–CT-RSA 2008, pp. 407–424. Springer (2008)
27.
go back to reference Papadopoulos, S., Yang, Y., Papadias, D.: CADS: continuous authentication on data streams. In: Proceedings of the 33rd International Conference on Very Large Data Bases, pp. 135–146. VLDB Endowment (2007) Papadopoulos, S., Yang, Y., Papadias, D.: CADS: continuous authentication on data streams. In: Proceedings of the 33rd International Conference on Very Large Data Bases, pp. 135–146. VLDB Endowment (2007)
28.
go back to reference Wen, T., Sheng, G., Guo, Q., Guo-Jun, S.: Query results authentication of outsourced append-only databases. J. Comput. Res. Dev. 49(10), 2077–2085 (2012) Wen, T., Sheng, G., Guo, Q., Guo-Jun, S.: Query results authentication of outsourced append-only databases. J. Comput. Res. Dev. 49(10), 2077–2085 (2012)
29.
go back to reference Sheng, G., Tang, C., Han, H., Gao, W., Hu, X.: Authentication of outsourced linear function query with efficient updates. Clust. Comput. 9, 1–9 (2017) Sheng, G., Tang, C., Han, H., Gao, W., Hu, X.: Authentication of outsourced linear function query with efficient updates. Clust. Comput. 9, 1–9 (2017)
30.
go back to reference Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Authenticated index structures for aggregation queries. ACM Trans. Inf. Syst. Secur. (TISSEC) 13(4), 32 (2010)CrossRef Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Authenticated index structures for aggregation queries. ACM Trans. Inf. Syst. Secur. (TISSEC) 13(4), 32 (2010)CrossRef
31.
go back to reference Chen, Q., Hu, H., Xu, J.: Authenticated online data integration services. Proceedings of the ACM SIGMOD International Conference, pp. 167–181. ACM (2015) Chen, Q., Hu, H., Xu, J.: Authenticated online data integration services. Proceedings of the ACM SIGMOD International Conference, pp. 167–181. ACM (2015)
32.
go back to reference Chandrasekhar, S., Singhal, M.: Efficient and scalable query authentication for cloud-based storage systems with multiple data sources. IEEE Trans. Serv. Comput. (2015) Chandrasekhar, S., Singhal, M.: Efficient and scalable query authentication for cloud-based storage systems with multiple data sources. IEEE Trans. Serv. Comput. (2015)
33.
go back to reference Chandrasekhar, S., Singhal, M.: Multi-trapdoor hash functions and their applications in network security. In: Proceedings of the IEEE Conference on Communications and Network Security, pp. 463–471. IEEE (2014) Chandrasekhar, S., Singhal, M.: Multi-trapdoor hash functions and their applications in network security. In: Proceedings of the IEEE Conference on Communications and Network Security, pp. 463–471. IEEE (2014)
34.
go back to reference Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Proceedings of the Advances in CryptologyCRYPTO91, pp. 129–140. Springer (1992) Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Proceedings of the Advances in CryptologyCRYPTO91, pp. 129–140. Springer (1992)
35.
go back to reference Durfee, G., Franklin, M.: Distribution chain security. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 63–70. ACM (2000) Durfee, G., Franklin, M.: Distribution chain security. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 63–70. ACM (2000)
Metadata
Title
Privacy protection and integrity verification of aggregate queries in cloud computing
Authors
Jun Hong
Tao Wen
Quan Guo
Zhengwang Ye
Ying Yin
Publication date
21-12-2017
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 3/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1521-0

Other articles of this Special Issue 3/2019

Cluster Computing 3/2019 Go to the issue

Premium Partner