Skip to main content

2022 | OriginalPaper | Buchkapitel

Ensuring the Big Data Integrity Through Verifiable Zero-Knowledge Operations

verfasst von : Elena B. Aleksandrova, Maria A. Poltavtseva, Vadim S. Shmatov

Erschienen in: Mobile Internet Security

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Information from databases is exposed to threats at all stages of its existence: from recording and storing in the database to processing and returning to the user. Big Data systems combine multiple DBMSs and databases. The problem of data integrity is the most acute in them. The article describes an approach to control the integrity of Big Data during their processing, based on verifiable zero knowledge operations. It can be applied to various complex systems containing heterogeneous Big Data databases. The proposed approach implements prospective data integrity protection against existing and hypothetical future threats.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Goddijn, I., Kouns, J.: 2020 Q1 Report Data Breach QuickView. Risk Based Security (2020) Goddijn, I., Kouns, J.: 2020 Q1 Report Data Breach QuickView. Risk Based Security (2020)
7.
Zurück zum Zitat Thuraisingham, B.: Database security: past, present, and future. In: 2015 IEEE International Congress on Big Data, pp. 772–774. IEEE (2015) Thuraisingham, B.: Database security: past, present, and future. In: 2015 IEEE International Congress on Big Data, pp. 772–774. IEEE (2015)
8.
Zurück zum Zitat Poltavtseva, M.A.: Evolution of data management systems and their security. In: Proceedings - 2019 International Conference on Engineering Technologies and Computer Science: Innovation and Application, EnT 2019, pp. 25–29 (2019). https://doi.org/10.1109/EnT.2019.00010 Poltavtseva, M.A.: Evolution of data management systems and their security. In: Proceedings - 2019 International Conference on Engineering Technologies and Computer Science: Innovation and Application, EnT 2019, pp. 25–29 (2019). https://​doi.​org/​10.​1109/​EnT.​2019.​00010
10.
Zurück zum Zitat Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression (1998) Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression (1998)
11.
Zurück zum Zitat Machanavajjhala, A., et al.: l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data (TKDD), 1(1), 3-es (2007) Machanavajjhala, A., et al.: l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data (TKDD), 1(1), 3-es (2007)
12.
Zurück zum Zitat Fernandez, E.B., et al.: The secure three-tier architecture pattern. In: 2008 International Conference on Complex, Intelligent and Software Intensive Systems, pp. 555–560. IEEE (2008) Fernandez, E.B., et al.: The secure three-tier architecture pattern. In: 2008 International Conference on Complex, Intelligent and Software Intensive Systems, pp. 555–560. IEEE (2008)
13.
Zurück zum Zitat Singh, S., Rai, R.K.: A review report on security threats on database. Int. J. Comput. Sci. Inf. Technol. 5(3), 3215–3219 (2014) Singh, S., Rai, R.K.: A review report on security threats on database. Int. J. Comput. Sci. Inf. Technol. 5(3), 3215–3219 (2014)
14.
Zurück zum Zitat Sarmah, S.: Database security–threats and prevention. IJCTT, 67(5), 46–50 (2019) Sarmah, S.: Database security–threats and prevention. IJCTT, 67(5), 46–50 (2019)
15.
Zurück zum Zitat Al-Sayid, N.A., Aldlaeen, D.: Database security threats: a survey study. In: 2013 5th International Conference on Computer Science and Information Technology, pp. 60–64. IEEE (2013) Al-Sayid, N.A., Aldlaeen, D.: Database security threats: a survey study. In: 2013 5th International Conference on Computer Science and Information Technology, pp. 60–64. IEEE (2013)
17.
Zurück zum Zitat Vlasova, O.A., Vasilyeva, A.S.: Protection and security of the database. Reshetnevskie readings, no. 21, p. 2 (2017) Vlasova, O.A., Vasilyeva, A.S.: Protection and security of the database. Reshetnevskie readings, no. 21, p. 2 (2017)
18.
Zurück zum Zitat Mousa, A., Karabatak, M., Mustafa, T.: Database security threats and challenges. In: 2020 8th International Symposium on Digital Forensics and Security (ISDFS), pp. 1–5. IEEE (2020) Mousa, A., Karabatak, M., Mustafa, T.: Database security threats and challenges. In: 2020 8th International Symposium on Digital Forensics and Security (ISDFS), pp. 1–5. IEEE (2020)
21.
Zurück zum Zitat Parno, B., et al.: Pinocchio: nearly practical verifiable computation. In: 2013 IEEE Symposium on Security and Privacy, pp. 238–252. IEEE (2013) Parno, B., et al.: Pinocchio: nearly practical verifiable computation. In: 2013 IEEE Symposium on Security and Privacy, pp. 238–252. IEEE (2013)
22.
Zurück zum Zitat Wahby, R.S., et al.: Doubly-efficient zkSNARKs without trusted setup. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 926–943. IEEE (2018) Wahby, R.S., et al.: Doubly-efficient zkSNARKs without trusted setup. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 926–943. IEEE (2018)
23.
Zurück zum Zitat Bünz, B., et al.: Bulletproofs: short proofs for confidential transactions and more. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 315–334. IEEE (2018) Bünz, B., et al.: Bulletproofs: short proofs for confidential transactions and more. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 315–334. IEEE (2018)
24.
Zurück zum Zitat Gennaro, R., et al.: Lattice-based zk-SNARKs from square span programs. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 556–573 (2018) Gennaro, R., et al.: Lattice-based zk-SNARKs from square span programs. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 556–573 (2018)
25.
Zurück zum Zitat Baum, C., Bootle, J., Cerulli, A., del Pino, R., Groth, J., Lyubashevsky, V.: Sub-linear lattice-based zero-knowledge arguments for arithmetic circuits. In: Shacham, H., Boldyreva, A. (eds.) Advances in Cryptology – CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II, pp. 669–699. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-96881-0_23CrossRef Baum, C., Bootle, J., Cerulli, A., del Pino, R., Groth, J., Lyubashevsky, V.: Sub-linear lattice-based zero-knowledge arguments for arithmetic circuits. In: Shacham, H., Boldyreva, A. (eds.) Advances in Cryptology – CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II, pp. 669–699. Springer, Cham (2018). https://​doi.​org/​10.​1007/​978-3-319-96881-0_​23CrossRef
26.
Zurück zum Zitat Ames, S., et al.: Ligero: lightweight sublinear arguments without a trusted setup. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2087–2104 (2017) Ames, S., et al.: Ligero: lightweight sublinear arguments without a trusted setup. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2087–2104 (2017)
27.
Zurück zum Zitat Ben-Sasson, E., et al.: Scalable, transparent, and post-quantum secure computational integrity. IACR Cryptol. ePrint Arch, vol. 2018, p. 46 (2018) Ben-Sasson, E., et al.: Scalable, transparent, and post-quantum secure computational integrity. IACR Cryptol. ePrint Arch, vol. 2018, p. 46 (2018)
28.
Zurück zum Zitat Ben-Sasson, E., Chiesa, A., Riabzev, M., Spooner, N., Virza, M., Ward, N.: Aurora: transparent succinct arguments for R1CS. In: Ishai, Y., Rijmen, V. (eds.) Advances in Cryptology – EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part I, pp. 103–128. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17653-2_4CrossRef Ben-Sasson, E., Chiesa, A., Riabzev, M., Spooner, N., Virza, M., Ward, N.: Aurora: transparent succinct arguments for R1CS. In: Ishai, Y., Rijmen, V. (eds.) Advances in Cryptology – EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part I, pp. 103–128. Springer, Cham (2019). https://​doi.​org/​10.​1007/​978-3-030-17653-2_​4CrossRef
29.
Zurück zum Zitat Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303–332 (1999)MathSciNetCrossRef Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303–332 (1999)MathSciNetCrossRef
Metadaten
Titel
Ensuring the Big Data Integrity Through Verifiable Zero-Knowledge Operations
verfasst von
Elena B. Aleksandrova
Maria A. Poltavtseva
Vadim S. Shmatov
Copyright-Jahr
2022
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-9576-6_15

Premium Partner