RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases

被引:0
|
作者
Maria Rodriguez-Henriquez, Lil [1 ]
Chakraborty, Debrup [1 ]
机构
[1] IPN, CINVESTAV, Dept Computac, Mexico City 07360, DF, Mexico
来源
SECURITY AND TRUST MANAGEMENT, STM 2013 | 2013年 / 8203卷
关键词
Database security; query authentication; bitmap index; MACs; EFFICIENT VERIFICATION;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security of outsourced databases is an important problem of current practical interest. In this paper we address the problem of authenticated query processing in outsourced databases. We describe the syntax of a generic scheme for authenticated query processing called RDAS, and provide security definitions for RDAS in line with concrete provable security. Then, we propose a new scheme called RDAS1 which enables a client to ensure both correctness and completeness of the query results obtained from a server. Our solution involves use of bitmap indices and message authentication codes in a novel manner. We prove that RDAS1 is secure relative to our security definition. Finally, we discuss a concrete improvement over RDAS1 (which we call RDAS2) and provide performance data for both RDAS1 and RDAS2 on a real data base.
引用
收藏
页码:115 / 130
页数:16
相关论文
共 50 条
  • [31] Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey
    Zhang, Bo
    Dong, Boxiang
    Wang, Wendy Hui
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2021, 33 (04) : 1601 - 1618
  • [32] Query assurance verification for outsourced multi-dimensional databases
    Cheng, Weiwei
    Tan, Kian-Lee
    JOURNAL OF COMPUTER SECURITY, 2009, 17 (01) : 101 - 126
  • [33] Query processing for RDF databases
    1600, Springer Verlag (8714):
  • [34] Query Processing for RDF Databases
    Kaoudi, Zoi
    Kementsietsidis, Anastasios
    REASONING WEB: REASONING ON THE WEB IN THE BIG DATA ERA, 2014, 8714 : 141 - +
  • [35] A new Top-k query processing algorithm to guarantee confidentiality of data and user queries on outsourced databases
    Hyeong-Jin Kim
    Jae-Woo Chang
    International Journal of System Assurance Engineering and Management, 2019, 10 : 898 - 904
  • [36] A new Top-k query processing algorithm to guarantee confidentiality of data and user queries on outsourced databases
    Kim, Hyeong-Jin
    Chang, Jae-Woo
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2019, 10 (05) : 898 - 904
  • [37] Provably-secure schemes for basic query support in outsourced databases
    Amanatidis, Georgios
    Boldyreva, Alexandra
    O'Neill, Adam
    DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 14 - +
  • [38] Biometrics authenticated key agreement scheme
    Yoon, Eun-Jun
    Yoo, Kee-Young
    NEXT GENERATION INFORMATION TECHNOLOGIES AND SYSTEMS, PROCEEDINGS, 2006, 4032 : 345 - 349
  • [39] An improvement on authenticated key agreement scheme
    Chang, Chin-Chen
    Lin, Shih-Yi
    2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 3 - +
  • [40] Key Assignment Scheme with Authenticated Encryption
    Kandele, Suyash
    Paul, Souradyuti
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (04) : 150 - 196