Abstract
As data stored in the cloud may encounter the malicious attack from the cloud service provider (CSP), to ensure data authenticity and integrity, it is necessary to authenticate the query results from CSP. However, most existing authentication methods focus on query over data from a single contributor in the outsourced database. This paper puts forward authentication method for query over data from multiple contributors in the cloud environment. The method can validate data from multiple contributors on only one authentication data structure (ADS) based on Merkle Hash Tree (MHT), which achieves low storage costs and high computational efficiency. Experimental results show that our mechanism can efficiently enable query authentication over cloud data from multiple contributors.
This work is partially supported by National Natural Science Foundation of China No. 61202034, 61232002, and Program for Innovative Research Team of Wuhan, No. 2014070504020237
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Fox, A., Griffith, R., et al.: Above the clouds: A berkeley view of cloudcomputing. Dept. Electrical Eng. and Comput. Sciences, University ofCalifornia, Berkeley, Tech. Rep. UCB/EECS, vol. 28 (2009)
Hacigümüs, H., Mehrotra, S., Iyer, B.R.: Providing Database as a Service. In: Proceedings of the 18th International Conference on Data Engineering, pp. 29–40 (2002)
Narasimha, M., Tsudik, G.: Authentication of outsourced databases using signature aggregation and chaining. In: Li Lee, M., Tan, K.-L., Wuwongse, V. (eds.) DASFAA 2006. LNCS, vol. 3882, pp. 420–436. Springer, Heidelberg (2006)
Pang, H., Jain, A., Ramamritham, K., et al.: Verifying completeness of relational query results in data publishing. In: Proceedings of ACM SIGMOD Conference (SIGMOD 2005), Baltimore, Maryland, USA (2005)
Mykletun, E., Narasimha, M., Tsudik, G.: Providing authentication and integrity in outsourced databases using Merkle hash trees. UCI-SCONCE Technical Report[R/OL] (2003), http://sconce.ics.uci.edu/das/MerkleODB.pdf
Li, F., Hadjieleftheriouz, M., Kolliosy, G., et al.: Dynamic authenticated index structures for outsourced databases. In: Proceedings of ACM SIGMOD Conference (SIGMOD 2006), Chicago, Illinois, USA (2006)
Cheng, W., Pang, H., Tan, K.-L.: Authenticating multi-dimensional query results in data publishing. In: Damiani, E., Liu, P. (eds.) Data and Applications Security 2006. LNCS, vol. 4127, pp. 60–73. Springer, Heidelberg (2006)
Yang, Y., Papadopoulos, S., Papadias, D., et al.: Authenticated indexing for outsourced spatial databases. VLDB Journal (2009)
Li, F., Hadjieleftheriouz, M., Kolliosy, G., et al.: Authenticated index structures for aggregation queries in outsourced databases, BUCS-TR-2006-011[R] (2006)
Sion, R.: Query execution assurance for outsourced databases. In: Proceedings of International Conference on Very Large Data Bases(VLDB 2005), Trondheim, Norway (2005)
Xie, M., Wang, H.J., Yin, J., et al.: Integrity auditing of outsourced data. In: Proceedings of International Conference on Very Large Data Bases(VLDB 2007), Vienna, Austria (2007)
Wang, H.J., Yin, J., Perng, C., et al.: Dual encryption for query integrity assurance. In: Proceedings of ACM Conference on Information and Knowledge Management (CIKM 2008), Napa Valley, California, USA (2008)
Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Xie, G., Peng, Z., Song, W. (2014). Query Authentication over Cloud Data from Multiple Contributors. In: Chen, L., Jia, Y., Sellis, T., Liu, G. (eds) Web Technologies and Applications. APWeb 2014. Lecture Notes in Computer Science, vol 8709. Springer, Cham. https://doi.org/10.1007/978-3-319-11116-2_41
Download citation
DOI: https://doi.org/10.1007/978-3-319-11116-2_41
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11115-5
Online ISBN: 978-3-319-11116-2
eBook Packages: Computer ScienceComputer Science (R0)