Abstract
Database outsourcing in Cloud Computing enables the data owner to store the data on cloud and assign the management to a cloud service provider (CSP), which provides various cloud services to the users. However, outsourcing database to cloud poses many challenges. One of the major concerns is confidentiality of the data. The general approach to tackle this issue is by encrypting the database before outsourcing, this helps in protecting confidentiality but poses a new problem of verifying the search results. We propose a lightweight verifiable auditing scheme for secure outsourcing of database, which encrypts the database and verifies search results with both parameters of correctness and completeness. We design our scheme based on a lightweight homomorphic encryption scheme (LHE) and efficient authenticated data structures to ensure the confidentiality and integrity of the database respectively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wang, J., Chen, X., Huang, X., You, I., Xiang, Y.: Verifiable auditing for outsourced database in cloud computing. IEEE Trans. Comput. 64(11), 3293–3303 (2015)
Narasimha, M., Tsudik, G.: Authentication of outsourced databases using signature aggregation and chaining. In: Li Lee, M., Tan, K.-L., Wuwongse, V. (eds.) DASFAA 2006. LNCS, vol. 3882, pp. 420–436. Springer, Heidelberg (2006). https://doi.org/10.1007/11733836_30
Hacigümüş, H., Iyer, B., Mehrotra, S.: Executing SQL over encrypted data in the Database-Service-Provider model. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2002, pp. 216–227 (2002)
Pang, H., Zhang, J., Mouratidis, K.: Scalable verification for outsourced dynamic databases. Proc. VLDB Endowment 2(1), 802–813 (2009)
Li, F., Hadjieleftheriou, M., Kollio, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: SIGMOD 2006, 27–29 June 2006, Chicago, Illinois, USA (2006)
Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. ACM Trans. Storage 2(2), 107–138 (2006)
Liu, D., Wang, S., Zic, J.: Privacy and integrity of outsourced data storage and processing. In: Big Data: Storage, Sharing, and Security (3S)
Chai, Q., Gong, G.: Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: Proceedings of the IEEE International Conference on Communications, ICC 2012, pp. 917–922 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Kumar, M., Pasupuleti, S.K. (2018). Lightweight Verifiable Auditing for Outsourced Database in Cloud Computing. In: Negi, A., Bhatnagar, R., Parida, L. (eds) Distributed Computing and Internet Technology. ICDCIT 2018. Lecture Notes in Computer Science(), vol 10722. Springer, Cham. https://doi.org/10.1007/978-3-319-72344-0_23
Download citation
DOI: https://doi.org/10.1007/978-3-319-72344-0_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72343-3
Online ISBN: 978-3-319-72344-0
eBook Packages: Computer ScienceComputer Science (R0)