A New Query Integrity Verification Method for Encrypted Data in Database Outsourcing

被引:0
|
作者
Jang, Miyoung [1 ]
Yoon, Min [1 ]
Song, Youngho [1 ]
Chang, Jae-Woo [1 ]
机构
[1] Chonbuk Natl Univ, Dept Comp Engn, 567 Baekjae Daero, Jeonju, South Korea
关键词
Data confidentiality; data transformation; query result authentication; k-NN query processing algorithm;
D O I
10.1007/978-3-662-47487-7_10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In database outsourcing, two issues of data security emerge: data confidentiality and data integrity. Existing data transformation schemes were widely studied for preserving data confidentiality, but they are vulnerable to data leakage problem because they do not consider data distribution when encrypting data. Meanwhile, query authentication schemes verifying data integrity, suffer from transmission overhead for verification data. In this paper, we propose a privacy-aware query authentication scheme which guarantees the data confidentiality and the query result integrity of sensitive data. To solve the original data leakage problem, we propose a bitmap-based data transformation scheme with anchor selection based on data distribution. Also, we devise a query result authentication index that stores an encrypted signature for each anchor so that it can reduce the amount of auditing data. Through performance evaluation, we show that our scheme outperforms the state-of-the-art method in terms of query processing time and verification overhead.
引用
收藏
页码:67 / 72
页数:6
相关论文
共 50 条
  • [31] A New Data Integrity Verification Mechanism for SaaS
    Shi, Yuliang
    Zhang, Kun
    Li, Qingzhong
    WEB INFORMATION SYSTEMS AND MINING, 2010, 6318 : 236 - 243
  • [32] Analysis and Enhancement of a Lattice-Based Data Outsourcing Scheme With Public Integrity Verification
    Wang, Qingxuan
    Cheng, Chi
    Xu, Rui
    Ding, Jintai
    Liu, Zhe
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (04) : 2226 - 2231
  • [33] A Secure Range Query Processing Algorithm for the Encrypted Database on the Cloud
    Kim, Hyeong-Il
    Choi, Munchul
    Kim, Hyeong-Jin
    Chang, Jae-Woo
    ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURETECH & MUE, 2016, 393 : 101 - 110
  • [34] A SECURE METHOD AGAINST FREQUENCY ATTACK FOR PATTERN QUERY ON ENCRYPTED STRING DATA
    Ravan, Rama Roshan
    Idris, Norbik Bashah
    Mehrabani, Zahra
    2013 INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA (ICICM), 2013, : 123 - 127
  • [35] Secure Query Processing Over Encrypted Database Through CryptDB
    Kumar, Ashutosh
    Hussain, Muzzammil
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 3, 2018, 709 : 307 - 319
  • [36] Scrambled Database with Encrypted Query Processing: CryptDB A Computational Analysis
    Rauthan, J. S.
    Vaisla, K. S.
    2017 1ST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND INFORMATION MANAGEMENT (ICISIM), 2017, : 199 - 211
  • [37] Searchable Encrypted String for Query Support on Different Encrypted Data Types
    Azizi, Shahrzad
    Mohammadpur, Davud
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (10): : 4198 - 4213
  • [38] Expressive query over outsourced encrypted data
    Yang, Yang
    Liu, Ximeng
    Deng, Robert
    INFORMATION SCIENCES, 2018, 442 : 33 - 53
  • [39] A Study on Batch Verification Scheme in Outsourced Encrypted Database
    Giau Ho Kim
    Manh Tran Cong
    Minh Nguyen Hieu
    SOICT 2019: PROCEEDINGS OF THE TENTH INTERNATIONAL SYMPOSIUM ON INFORMATION AND COMMUNICATION TECHNOLOGY, 2019, : 502 - 507
  • [40] Private Key Based Query on Encrypted Data
    Afzali, Hammad
    Nemati, Hamed
    Azmi, Reza
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 4 (01): : 41 - 50