Skip to main content

2015 | OriginalPaper | Buchkapitel

74. Encrypted Data Group Authentication for Outsourced Databases

verfasst von : Miyoung Jang, Ara Jo, Jae-Woo Chang

Erschienen in: Ubiquitous Computing Application and Wireless Sensor

Verlag: Springer Netherlands

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing has been spotlighted as a new paradigm of database management system. However, privacy needs to be preserved for databases that are valuable and sensitive against unauthorized accesses. For this, two issues of data security, including data confidentiality and query result integrity, become major concerns for users. Existing bucket-based data authentication methods have problems of data disclosure and transmission overhead, due to the unsophisticated data grouping strategy. In this paper, we propose a privacy-aware query authentication index which guarantees data confidentiality and query result integrity for users. We privately partition a spatial database into small groups by using periodic function and generate a signature of each group. The group signature is used to check the correctness and completeness of outsourced data when answering a range query to users. Through performance evaluation, it is shown that proposed method outperforms the existing method in terms of range query processing time up to 3 times.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat FIP Standard (2001) Advanced encryption standard (AES). National Institute of Standards and Technology (NIST) FIP Standard (2001) Advanced encryption standard (AES). National Institute of Standards and Technology (NIST)
2.
Zurück zum Zitat Chow CY, Mokbel MF, Liu X (2011) Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica 15(2):351–380CrossRef Chow CY, Mokbel MF, Liu X (2011) Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica 15(2):351–380CrossRef
3.
Zurück zum Zitat Kerr S, Krkpatrick MS, Bertino E (2010) PEAR: a hardware based protocol authentication system. In: Proceedings of the 3rd ACM SIGSPATIAL international workshop on security and privacy in GIS and LBS, pp 18–25 Kerr S, Krkpatrick MS, Bertino E (2010) PEAR: a hardware based protocol authentication system. In: Proceedings of the 3rd ACM SIGSPATIAL international workshop on security and privacy in GIS and LBS, pp 18–25
4.
Zurück zum Zitat Wang J et al (2010) Bucket-based authentication for outsourced databases. Concurrency Comput Pract Experience 22(9):1160–1180 Wang J et al (2010) Bucket-based authentication for outsourced databases. Concurrency Comput Pract Experience 22(9):1160–1180
5.
Zurück zum Zitat Mykletun E, Narasimha M, Tsudik G (2004) Signature bouquets: immutability for aggregated/condensed signatures. In: European symposium on research in computer security (ESORICS), pp 160–176 Mykletun E, Narasimha M, Tsudik G (2004) Signature bouquets: immutability for aggregated/condensed signatures. In: European symposium on research in computer security (ESORICS), pp 160–176
6.
Zurück zum Zitat Mykletun E, Narasimha M, Tsudik G (2006) Authentication and integrity in outsourced databases. J ACM Trans Storage (TOS) 2(2):107–138 Mykletun E, Narasimha M, Tsudik G (2006) Authentication and integrity in outsourced databases. J ACM Trans Storage (TOS) 2(2):107–138
7.
Zurück zum Zitat Merkle RC (1990) A certified digital signature. Advances in cryptology—CRYPTO’89 proceedings. Springer, New York, pp 218–238 Merkle RC (1990) A certified digital signature. Advances in cryptology—CRYPTO’89 proceedings. Springer, New York, pp 218–238
8.
Zurück zum Zitat Narasimha M, Tsudik G (2005) DSAC: integrity for outsourced databases with signature aggregation and chaining. In: Proceedings of the 14th ACM international conference on information and knowledge management, ACM, New york, pp 235–236 Narasimha M, Tsudik G (2005) DSAC: integrity for outsourced databases with signature aggregation and chaining. In: Proceedings of the 14th ACM international conference on information and knowledge management, ACM, New york, pp 235–236
9.
Zurück zum Zitat Sacharidis D, Mouratidis K, Papadias D (2010) k-Anonymity in the presence of external databases. IEEE Trans Knowl Data Eng 22(3):392–403CrossRef Sacharidis D, Mouratidis K, Papadias D (2010) k-Anonymity in the presence of external databases. IEEE Trans Knowl Data Eng 22(3):392–403CrossRef
10.
Zurück zum Zitat Yang Y, Papadias D, Papadopoulos S, Kalnis P (2009) Authenticated join processing in outsourced databases. In: ACM SIGMOD international conference on management of data, ACM, New york, pp 5–18 Yang Y, Papadias D, Papadopoulos S, Kalnis P (2009) Authenticated join processing in outsourced databases. In: ACM SIGMOD international conference on management of data, ACM, New york, pp 5–18
11.
Zurück zum Zitat Liu D, Wang S, (2012) Query encrypted databases practically. In: Proceedings of the ACM conference on computer and communications security, ACM, New York, pp 1049–1051 Liu D, Wang S, (2012) Query encrypted databases practically. In: Proceedings of the ACM conference on computer and communications security, ACM, New York, pp 1049–1051
12.
Zurück zum Zitat Hore B et al (2012) Secure multidimensional range queries over outsourced data. Int J Very Large Data Bases 21(3):333–358CrossRef Hore B et al (2012) Secure multidimensional range queries over outsourced data. Int J Very Large Data Bases 21(3):333–358CrossRef
13.
Zurück zum Zitat Balpande S et al (2012) Data integrity and confidentiality in outsourced database. In: International conference and workshop on recent trends in technology, (TCET) Balpande S et al (2012) Data integrity and confidentiality in outsourced database. In: International conference and workshop on recent trends in technology, (TCET)
14.
Zurück zum Zitat Devanbu P, Gertz M, Martel C, Stubblebine S (2003) Authentic data publication over the internet. J Comput Secur 11(3):291–314 Devanbu P, Gertz M, Martel C, Stubblebine S (2003) Authentic data publication over the internet. J Comput Secur 11(3):291–314
15.
Zurück zum Zitat Hacigumus H, Iyer B, Li C, Mehrotra S, (2002) Executing SQL over encrypted data in the database service provider model. ACM SIGMOD, New York, pp 216–227 Hacigumus H, Iyer B, Li C, Mehrotra S, (2002) Executing SQL over encrypted data in the database service provider model. ACM SIGMOD, New York, pp 216–227
16.
Zurück zum Zitat Hore B, Mehrotra S, Tsudik G (2004) A privacy-preserving index for range queries. In: Proceedings of the 30th international conference on very large data bases-Volume 30, VLDB Endowment, pp 720–731 Hore B, Mehrotra S, Tsudik G (2004) A privacy-preserving index for range queries. In: Proceedings of the 30th international conference on very large data bases-Volume 30, VLDB Endowment, pp 720–731
17.
Zurück zum Zitat Wang J, Du X (2008) A secure multi-dimensional partition based index in DAS. Progress in WWW research and development. Springer, Heidelberg, pp 319–330 Wang J, Du X (2008) A secure multi-dimensional partition based index in DAS. Progress in WWW research and development. Springer, Heidelberg, pp 319–330
18.
Zurück zum Zitat Wang C, Ku W, (2012) Efficient evaluation of skyline queries in wireless data broadcast environments. In: Proceedings of the 20th international conference on advances in geographic information systems, ACM, New York, pp 442–445 Wang C, Ku W, (2012) Efficient evaluation of skyline queries in wireless data broadcast environments. In: Proceedings of the 20th international conference on advances in geographic information systems, ACM, New York, pp 442–445
19.
Zurück zum Zitat Rivest R, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126CrossRefMATHMathSciNet Rivest R, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126CrossRefMATHMathSciNet
20.
Zurück zum Zitat Theodoridis Y, Silva J, Nascimento M (1999) On the generation of spatiotemporal datasets. Adv spat databases. Springer. Heidelberg, pp 147–164 Theodoridis Y, Silva J, Nascimento M (1999) On the generation of spatiotemporal datasets. Adv spat databases. Springer. Heidelberg, pp 147–164
Metadaten
Titel
Encrypted Data Group Authentication for Outsourced Databases
verfasst von
Miyoung Jang
Ara Jo
Jae-Woo Chang
Copyright-Jahr
2015
Verlag
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-017-9618-7_74

Neuer Inhalt