Skip to main content
Erschienen in: Neural Computing and Applications 2/2021

21.06.2020 | S.I. : DPTA Conference 2019

Improved algorithm for management of outsourced database

verfasst von: Zhen Guo, Jun Ye

Erschienen in: Neural Computing and Applications | Ausgabe 2/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In cloud storage, clients outsource data storage to save local resources. Clients lose the controllability to manage data, and cloud service providers are usually untrusted. When clients want to know the correctness of data anytime, they have to verify the data. In this paper, we focus on the validation of outsourced data. We propose a data correctness verification scheme to verify the correctness of cloud storage data. By calculating the validation data, when the user queries the data, it is easy to determine whether the cloud server returns the correct data. In addition, clients can update outsourced data. When updating the database, the clients can verify the correctness of the updated file by calculating and producing a new proof. The efficiency of data validation is very high, and the computational overhead on the client side is very low. This scheme is suitable for the resource-constrained devices, such as wearable devices. This scheme can be applied in the IoT perception layer with limited computing resources.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Huang L, Zhou J, Zhang G, Sun J, Wang T, Vajdi A (2018) Certificateless public verification for the outsourced data integrity in cloud storage. J Circuits Syst Comput 27(11):1–17CrossRef Huang L, Zhou J, Zhang G, Sun J, Wang T, Vajdi A (2018) Certificateless public verification for the outsourced data integrity in cloud storage. J Circuits Syst Comput 27(11):1–17CrossRef
2.
Zurück zum Zitat Wu T, Lin Y, Wang K, Chen C, Pan J (2017) Comments on Yu et al's shared data integrity verification protocol. In: The Euro-China conference on intelligent data analysis and applications, pp 73–78 Wu T, Lin Y, Wang K, Chen C, Pan J (2017) Comments on Yu et al's shared data integrity verification protocol. In: The Euro-China conference on intelligent data analysis and applications, pp 73–78
3.
Zurück zum Zitat Ye J, Ding Y (2018) Controllable keyword search scheme supporting multiple users. Future Gener Comput Syst 81:433–442CrossRef Ye J, Ding Y (2018) Controllable keyword search scheme supporting multiple users. Future Gener Comput Syst 81:433–442CrossRef
4.
Zurück zum Zitat Ye J, Xu Z, Ding Y (2018) Image search scheme over encrypted database. Future Gener Comput Syst 87:251–258CrossRef Ye J, Xu Z, Ding Y (2018) Image search scheme over encrypted database. Future Gener Comput Syst 87:251–258CrossRef
5.
Zurück zum Zitat Demertzis K, Lazaros I (2016) Detecting invasive species with a bio-inspired semi-supervised neurocomputing approach: the case of Lagocephalus sceleratus. Neural Comput Appl 27(141):1–10 Demertzis K, Lazaros I (2016) Detecting invasive species with a bio-inspired semi-supervised neurocomputing approach: the case of Lagocephalus sceleratus. Neural Comput Appl 27(141):1–10
6.
Zurück zum Zitat Backes M, Fiore D, Reischuk RM (2013) Verifiable delegation of computation on outsourced data. In: 2013 ACM SIGSAC conference on computer and communications security, CCS’13, Berlin, Germany, November 4–8, 2013, pp 863–874 Backes M, Fiore D, Reischuk RM (2013) Verifiable delegation of computation on outsourced data. In: 2013 ACM SIGSAC conference on computer and communications security, CCS’13, Berlin, Germany, November 4–8, 2013, pp 863–874
7.
Zurück zum Zitat Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Theory of cryptography, proceedings of the 4th theory of cryptography conference, TCC 2007, Amsterdam, The Netherlands, February 21–24, 2007, pp 535–554 Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Theory of cryptography, proceedings of the 4th theory of cryptography conference, TCC 2007, Amsterdam, The Netherlands, February 21–24, 2007, pp 535–554
8.
Zurück zum Zitat Ateniese G, Burns RC, Curtmola R, Herring J, Kissner L, Peterson ZNJ, Song DX (2007) Provable data possession at untrusted stores. In: Proceedings of the 2007 ACM conference on computer and communications security, CCS 2007, Alexandria, Virginia, USA, October 28–31, 2007, pp 598–609 Ateniese G, Burns RC, Curtmola R, Herring J, Kissner L, Peterson ZNJ, Song DX (2007) Provable data possession at untrusted stores. In: Proceedings of the 2007 ACM conference on computer and communications security, CCS 2007, Alexandria, Virginia, USA, October 28–31, 2007, pp 598–609
9.
Zurück zum Zitat Chung K, Kalai YT, Vadhan SP (2010) Improved delegation of computation using fully homomorphic encryption. In: Proceedings of the 30th annual cryptology conference on advances in cryptology—CRYPTO 2010, Santa Barbara, CA, USA, August 15–19, 2010, pp 483–501 Chung K, Kalai YT, Vadhan SP (2010) Improved delegation of computation using fully homomorphic encryption. In: Proceedings of the 30th annual cryptology conference on advances in cryptology—CRYPTO 2010, Santa Barbara, CA, USA, August 15–19, 2010, pp 483–501
10.
Zurück zum Zitat Chen D, Zhang N, Lu R, Fang X, Zhang K, Qin Z, Shen X (2018) An LDPC code based physical layer message authentication scheme with prefect security. IEEE J Sel Areas Commun 36(4):748–761CrossRef Chen D, Zhang N, Lu R, Fang X, Zhang K, Qin Z, Shen X (2018) An LDPC code based physical layer message authentication scheme with prefect security. IEEE J Sel Areas Commun 36(4):748–761CrossRef
11.
Zurück zum Zitat Naito Y (2015) Full PRF-secure message authentication code based on tweakable block cipher. In: Proceedings of the 9th international conference on provable security, ProvSec 2015, Kanazawa, Japan, November 24–26, 2015, pp 167–182 Naito Y (2015) Full PRF-secure message authentication code based on tweakable block cipher. In: Proceedings of the 9th international conference on provable security, ProvSec 2015, Kanazawa, Japan, November 24–26, 2015, pp 167–182
12.
Zurück zum Zitat Liu C, Ranjan R, Yang C, Zhang X, Wang L, Chen J (2015) MuR-DPA: top–down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans Comput 64(9):2609–2622MathSciNetCrossRef Liu C, Ranjan R, Yang C, Zhang X, Wang L, Chen J (2015) MuR-DPA: top–down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans Comput 64(9):2609–2622MathSciNetCrossRef
13.
Zurück zum Zitat Zhu E, Ye F, Dou J, Wang C (2018) A comparison method of massive power consumption information collection test data based on improved merkle tree. In: Data science—proceedings of the 4th international conference of pioneering computer scientists, engineers and educators, part II, ICPCSEE 2018, Zhengzhou, China, September 21–23, 2018, pp 401–415 Zhu E, Ye F, Dou J, Wang C (2018) A comparison method of massive power consumption information collection test data based on improved merkle tree. In: Data science—proceedings of the 4th international conference of pioneering computer scientists, engineers and educators, part II, ICPCSEE 2018, Zhengzhou, China, September 21–23, 2018, pp 401–415
14.
Zurück zum Zitat Benabbas S, Gennaro R, Vahlis Y (2011) Verifiable delegation of computation over large datasets. In: Advances in cryptology—CRYPTO 2011—proceedings of the 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011, pp 111–131 Benabbas S, Gennaro R, Vahlis Y (2011) Verifiable delegation of computation over large datasets. In: Advances in cryptology—CRYPTO 2011—proceedings of the 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011, pp 111–131
15.
Zurück zum Zitat Catalano D, Fiore D (2013) Vector commitments and their applications. In: Public-key cryptography—PKC 2013—proceedings of the 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013, pp 55–72 Catalano D, Fiore D (2013) Vector commitments and their applications. In: Public-key cryptography—PKC 2013—proceedings of the 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013, pp 55–72
17.
Zurück zum Zitat Ma D, Deng RH, Pang H, Zhou J (2005) Authenticating query results in data publishing. In: Information and communications security, proceedings of the 7th international conference, ICICS 2005, Beijing, China, December 10–13, 2005, pp 376–388 Ma D, Deng RH, Pang H, Zhou J (2005) Authenticating query results in data publishing. In: Information and communications security, proceedings of the 7th international conference, ICICS 2005, Beijing, China, December 10–13, 2005, pp 376–388
18.
Zurück zum Zitat Syam Kumar P, Subramanian R, Thamizh Selvam D (2013) An efficient distributed verification protocol for data storage security in cloud computing. In: Proceedings of the 2nd international conference on advanced computing, networking and security, Mangalore, India, December 15–17, 2013, pp 214–219 Syam Kumar P, Subramanian R, Thamizh Selvam D (2013) An efficient distributed verification protocol for data storage security in cloud computing. In: Proceedings of the 2nd international conference on advanced computing, networking and security, Mangalore, India, December 15–17, 2013, pp 214–219
19.
Zurück zum Zitat Choi SG, Katz J, Kumaresan R, Cid C (2015) Multi-client noninteractive verifiable computation. In: IACR cryptology ePrint archive, 2015, p 190 Choi SG, Katz J, Kumaresan R, Cid C (2015) Multi-client noninteractive verifiable computation. In: IACR cryptology ePrint archive, 2015, p 190
20.
Zurück zum Zitat Parno B, Raykova M, Vaikuntanathan V (2012) How to delegate and verify in public: verifiable computation from attribute-based encryption. In: Theory of cryptography—proceedings of the 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–1, 2012, pp 422–439 Parno B, Raykova M, Vaikuntanathan V (2012) How to delegate and verify in public: verifiable computation from attribute-based encryption. In: Theory of cryptography—proceedings of the 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–1, 2012, pp 422–439
21.
Zurück zum Zitat Ye J, Xu Z, Ding Y (2016) Secure outsourcing of modular exponentiations in cloud and cluster computing. Clust Comput 19(2):811–820CrossRef Ye J, Xu Z, Ding Y (2016) Secure outsourcing of modular exponentiations in cloud and cluster computing. Clust Comput 19(2):811–820CrossRef
22.
Zurück zum Zitat Ye J, Wang J (2015) Secure outsourcing of modular exponentiation with single untrusted server. In: Proceedings of the 18th international conference on network-based information systems, NBis 2015, Taipei, Taiwan, September 2–4, 2015, pp 643–645 Ye J, Wang J (2015) Secure outsourcing of modular exponentiation with single untrusted server. In: Proceedings of the 18th international conference on network-based information systems, NBis 2015, Taipei, Taiwan, September 2–4, 2015, pp 643–645
Metadaten
Titel
Improved algorithm for management of outsourced database
verfasst von
Zhen Guo
Jun Ye
Publikationsdatum
21.06.2020
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 2/2021
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-020-05047-7

Weitere Artikel der Ausgabe 2/2021

Neural Computing and Applications 2/2021 Zur Ausgabe