A New Query Integrity Verification Method for Encrypted Data in Database Outsourcing

被引:0
|
作者
Jang, Miyoung [1 ]
Yoon, Min [1 ]
Song, Youngho [1 ]
Chang, Jae-Woo [1 ]
机构
[1] Chonbuk Natl Univ, Dept Comp Engn, 567 Baekjae Daero, Jeonju, South Korea
关键词
Data confidentiality; data transformation; query result authentication; k-NN query processing algorithm;
D O I
10.1007/978-3-662-47487-7_10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In database outsourcing, two issues of data security emerge: data confidentiality and data integrity. Existing data transformation schemes were widely studied for preserving data confidentiality, but they are vulnerable to data leakage problem because they do not consider data distribution when encrypting data. Meanwhile, query authentication schemes verifying data integrity, suffer from transmission overhead for verification data. In this paper, we propose a privacy-aware query authentication scheme which guarantees the data confidentiality and the query result integrity of sensitive data. To solve the original data leakage problem, we propose a bitmap-based data transformation scheme with anchor selection based on data distribution. Also, we devise a query result authentication index that stores an encrypted signature for each anchor so that it can reduce the amount of auditing data. Through performance evaluation, we show that our scheme outperforms the state-of-the-art method in terms of query processing time and verification overhead.
引用
收藏
页码:67 / 72
页数:6
相关论文
共 50 条
  • [1] A Method of Query over Encrypted Data in Database
    Liu, Lianzhong
    Gai, Jingfen
    2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 23 - 27
  • [2] On query result integrity over encrypted data
    Esiner, Ertem
    Datta, Anwitaman
    INFORMATION PROCESSING LETTERS, 2017, 122 : 34 - 39
  • [3] An Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud
    K. L. Neela
    V. Kavitha
    Wireless Personal Communications, 2022, 123 : 2431 - 2448
  • [4] An Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud
    Neela, K. L.
    Kavitha, V
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 123 (03) : 2431 - 2448
  • [5] Query Integrity Meets Blockchain: A Privacy-Preserving Verification Framework for Outsourced Encrypted Data
    Jiang, Shunrong
    Liu, Jianqing
    Chen, Jingwei
    Liu, Yiliang
    Wang, Liangmin
    Zhou, Yong
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (03) : 2100 - 2113
  • [6] Integrity Assurance Method of Multi-Keyword Query for Encrypted Outsourced Data
    Wang, Ling
    Ji, Shan
    Wang, Zhaokang
    Wang, Xiaowan
    Mohiuddin, Ghulam
    Ren, Yongjun
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (01): : 221 - 234
  • [7] Fast query over encrypted character data in database
    Wang, ZF
    Dai, J
    Wang, W
    Shi, BL
    COMPUTATIONAL AND INFORMATION SCIENCE, PROCEEDINGS, 2004, 3314 : 1027 - 1033
  • [8] Fine-Grained Query Authorization With Integrity Verification Over Encrypted Spatial Data in Cloud Storage
    Tian, Feng
    Wu, Zhenqiang
    Gui, Xiaolin
    Ni, Jianbing
    Shen, Xuemin
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (03) : 1831 - 1847
  • [9] A novel approach for query over encrypted data in database
    Al-Saraireh J.
    International Journal of Information and Computer Security, 2019, 11 (06) : 621 - 636
  • [10] An Effective Encrypted Scheme Over Outsourcing Data for Query on Cloud Platform
    Tang, Jianchao
    Fu, Shaojing
    Xu, Ming
    IEEE ACCESS, 2019, 7 : 66242 - 66250