Skip to main content
Erschienen in: Cluster Computing 3/2019

04.09.2017

Verifiable algorithm for outsourced database with updating

verfasst von: Zhen Guo, Hui Li, Chunjie Cao, Zhengxi Wei

Erschienen in: Cluster Computing | Sonderheft 3/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In cloud computing, by using the outsourcing technique, the clients can perform the complex tasks easily with the help of cloud computing. However, cloud service providers are usually untrusted, thus, the clients may lose the controllability of outsourced data. Therefore, it is important to guarantee the security of the outsourced data. In this paper, we focus on the security of outsourced database. A verification scheme for out-sourced database is proposed. In this scheme, the out-sourced data is disguised, and the cloud server cannot get the original data. If the cloud server returns dummy data (changed data, real data but not the required one), it will be detected by the clients easily. Furthermore, the clients can update the outsourced data, and a new proof will be generated to ensure the correctness of the data. The efficiency of data update is very high, and the computational cost of the client is low. This scheme is suitable for the resource-constrained devices, such as wearable devices.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Atallah, M.J., K. N, P., J.R, R., E.H, S.: Secure outsourcing of scientific computations. Adv. Comput. 54, 215–272 (2002)CrossRef Atallah, M.J., K. N, P., J.R, R., E.H, S.: Secure outsourcing of scientific computations. Adv. Comput. 54, 215–272 (2002)CrossRef
2.
Zurück zum Zitat Backes, M., Fiore, D., Reischuk, R.M.: Verifiable delegation of computation on outsourced data. In: 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS’13, Berlin, Germany, November 4–8, 2013, pp. 863–874, (2013) Backes, M., Fiore, D., Reischuk, R.M.: Verifiable delegation of computation on outsourced data. In: 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS’13, Berlin, Germany, November 4–8, 2013, pp. 863–874, (2013)
3.
Zurück zum Zitat Beaver, D., Feigenbaum, J.: Hiding instances in multi-oracle queries. In: Proceedings of STAC’ 90, vol. 415, pp. 37–48. Springer, Berlin (1990)CrossRef Beaver, D., Feigenbaum, J.: Hiding instances in multi-oracle queries. In: Proceedings of STAC’ 90, vol. 415, pp. 37–48. Springer, Berlin (1990)CrossRef
4.
Zurück zum Zitat Beaver, D., Feigenbaum, J., Kilian, J., Rogaway, P.: Locally random reductions: improvements and applications. J. Cryptol. 10(1), 17–36 (1997)MathSciNetCrossRef Beaver, D., Feigenbaum, J., Kilian, J., Rogaway, P.: Locally random reductions: improvements and applications. J. Cryptol. 10(1), 17–36 (1997)MathSciNetCrossRef
5.
Zurück zum Zitat Benabbas, S., Gennaro, R., Vahlis. Y.: Verifiable del-egation of computation over large datasets. In: Advances in Cryptology - CRYPTO 2011—Proceedings of the 31st Annual Cryptology Conference, pp. 111–131. Santa Barbara, CA, USA, 14–18 August 2011 Benabbas, S., Gennaro, R., Vahlis. Y.: Verifiable del-egation of computation over large datasets. In: Advances in Cryptology - CRYPTO 2011—Proceedings of the 31st Annual Cryptology Conference, pp. 111–131. Santa Barbara, CA, USA, 14–18 August 2011
6.
Zurück zum Zitat Benjamin, D., Atallah, M.J.: Private and cheating-free outsourcing of algebraic computations. In: Sixth Annual Conference on Privacy, Security and Trust, PST, 2008, pp. 240–245. Springer, Fredericton, New Brunswick, Canada. October 2008 Benjamin, D., Atallah, M.J.: Private and cheating-free outsourcing of algebraic computations. In: Sixth Annual Conference on Privacy, Security and Trust, PST, 2008, pp. 240–245. Springer, Fredericton, New Brunswick, Canada. October 2008
7.
Zurück zum Zitat Blum, M., Kannan, S.: Designing programs that check their work. J. ACM 42(1), 269–291 (1995)CrossRef Blum, M., Kannan, S.: Designing programs that check their work. J. ACM 42(1), 269–291 (1995)CrossRef
8.
Zurück zum Zitat Blum, M., Luby, M., Rubinfeld, R.: Self-testing/correcting with applications to numerical problems. J. Comput. Syst. Sci. 47(3), 549–595 (1993)MathSciNetCrossRef Blum, M., Luby, M., Rubinfeld, R.: Self-testing/correcting with applications to numerical problems. J. Comput. Syst. Sci. 47(3), 549–595 (1993)MathSciNetCrossRef
9.
Zurück zum Zitat Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Theory of Cryptography, Proceedings of the 4th Theory of Cryptography Conference, TCC 2007, pp. 535–554. Amsterdam, The Netherlands, 21–24 February 2007 Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Theory of Cryptography, Proceedings of the 4th Theory of Cryptography Conference, TCC 2007, pp. 535–554. Amsterdam, The Netherlands, 21–24 February 2007
10.
Zurück zum Zitat Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25(6), 599–616 (2009)CrossRef Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25(6), 599–616 (2009)CrossRef
11.
Zurück zum Zitat Catalano, D., Fiore, D.: Vector commitments and their applications. In: Public-Key Cryptography—PKC 2013—Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, pp. 55–72. Nara, Japan, 26 February–1 March 2013CrossRef Catalano, D., Fiore, D.: Vector commitments and their applications. In: Public-Key Cryptography—PKC 2013—Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, pp. 55–72. Nara, Japan, 26 February–1 March 2013CrossRef
12.
Zurück zum Zitat Ding, Y., Xu, Z., Ye, J., Choo, K.K.R.: Secure outsourcing of modular exponentiations under single un-trused programme model. J. Comput. Syst. Sci. (2016) Ding, Y., Xu, Z., Ye, J., Choo, K.K.R.: Secure outsourcing of modular exponentiations under single un-trused programme model. J. Comput. Syst. Sci. (2016)
13.
Zurück zum Zitat Rosario, G., Craig, G., Bryan, P.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, pp. 465–482. Santa Barbara, CA, USA, 15–19 August 2010 Rosario, G., Craig, G., Bryan, P.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, pp. 465–482. Santa Barbara, CA, USA, 15–19 August 2010
14.
Zurück zum Zitat Ma, D., Deng, R.H., Pang, H., Zhou, J.: Authenticating query results in data publishing. In: Information and Communications Security, Proceedings of the 7th Inter-national Conference, ICICS 2005, pp. 376–388. Beijing, China, 10–13 December 2005CrossRef Ma, D., Deng, R.H., Pang, H., Zhou, J.: Authenticating query results in data publishing. In: Information and Communications Security, Proceedings of the 7th Inter-national Conference, ICICS 2005, pp. 376–388. Beijing, China, 10–13 December 2005CrossRef
15.
Zurück zum Zitat Pang, H., Jain, A., Ramamritham, K., Tan K.: Verifying completeness of relational query results in data publishing. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 407–418. Baltimore, Maryland, USA, 14–16 June 2005 Pang, H., Jain, A., Ramamritham, K., Tan K.: Verifying completeness of relational query results in data publishing. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 407–418. Baltimore, Maryland, USA, 14–16 June 2005
16.
Zurück zum Zitat Parno, B., Raykova, M., Vaikuntanathan V.: How to delegate and verify in public: verifiable computation from attribute-based encryption. In: Theory of Cryptography -Proceedings of 9th Theory of Cryptography Conference, TCC 2012, pp. 422–439. Taormina, Sicily, Italy, 19–21 March 2012CrossRef Parno, B., Raykova, M., Vaikuntanathan V.: How to delegate and verify in public: verifiable computation from attribute-based encryption. In: Theory of Cryptography -Proceedings of 9th Theory of Cryptography Conference, TCC 2012, pp. 422–439. Taormina, Sicily, Italy, 19–21 March 2012CrossRef
17.
Zurück zum Zitat Ye, J., Xu, Z., Ding, Y.: Secure outsourcing of modular exponentiations in cloud and cluster computing. Clust. Comput. 19(2), 811–820 (2016)CrossRef Ye, J., Xu, Z., Ding, Y.: Secure outsourcing of modular exponentiations in cloud and cluster computing. Clust. Comput. 19(2), 811–820 (2016)CrossRef
18.
Zurück zum Zitat Ye, J., Zhang, H., Fu, C.: Verifiable delegation of polynomials. Int. J. Netw. Secur. 18(2), 283–290 (2016) Ye, J., Zhang, H., Fu, C.: Verifiable delegation of polynomials. Int. J. Netw. Secur. 18(2), 283–290 (2016)
20.
Zurück zum Zitat Yu, J., Wang, X., Gao, W.: Improvement and applications of secure outsourcing of scientific computations. J. Ambient Intell. Humaniz. Comput. 6(6), 763–772 (2015)CrossRef Yu, J., Wang, X., Gao, W.: Improvement and applications of secure outsourcing of scientific computations. J. Ambient Intell. Humaniz. Comput. 6(6), 763–772 (2015)CrossRef
21.
Zurück zum Zitat Zhou, X., Ding, Y., Wang, Z., Li, X., Ye, J., Xu, Z.: Secure outsourcing algorithm of polynomials in cloud computing. In: The 28th International Conference on Software Engineering and Knowledge Engineering, SEKE 2016, pp. 46–51. Redwood City, San Francisco Bay, USA, 1–3 July 2016 Zhou, X., Ding, Y., Wang, Z., Li, X., Ye, J., Xu, Z.: Secure outsourcing algorithm of polynomials in cloud computing. In: The 28th International Conference on Software Engineering and Knowledge Engineering, SEKE 2016, pp. 46–51. Redwood City, San Francisco Bay, USA, 1–3 July 2016
Metadaten
Titel
Verifiable algorithm for outsourced database with updating
verfasst von
Zhen Guo
Hui Li
Chunjie Cao
Zhengxi Wei
Publikationsdatum
04.09.2017
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 3/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1133-8

Weitere Artikel der Sonderheft 3/2019

Cluster Computing 3/2019 Zur Ausgabe

Premium Partner