Skip to main content

Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach

  • Conference paper
Information Systems Security (ICISS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7671))

Included in the following conference series:

Abstract

An important security challenge in database outsourcing scenarios is the correctness verification of query results. The proposed approaches in the literature, impose high overhead on both the service provider and specially the clients. In this paper, we propose the Trust-Based Fake Tuples approach to audit the correctness of query results. In this approach, some fake tuples are included among the real ones in order to verify the correctness of the results. The experience learnt from past results is used in this paper to evaluate the trust toward the service provider. This trust value is used to tune the number of fake tuples and subsequently the imposed overhead. As the trust value toward the service provider increases, the number of fake tuples and imposed overhead decreases. The experimental results confirm the effectiveness of our approach on the reduction of overhead while keeping the probability of incorrect results in its acceptable level.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hacigumus, H., Iyer, B.: Providing Database as a Service. In: International Conference of Data Engineering (2002)

    Google Scholar 

  2. Samarati, P., Capitani, S.D.: Data Protection in Outsourcing Scenarios: Issues and Directions. In: ASIACCS 2010 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 1–14 (2010)

    Google Scholar 

  3. Narasimha, M., Tsudik, G.: Authentication of Outsourced Databases Using Signature Aggregation and Chaining. In: Li Lee, M., Tan, K.-L., Wuwongse, V. (eds.) DASFAA 2006. LNCS, vol. 3882, pp. 420–436. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  4. Noferesti, M., Hadavi, M.A., Jalili, R.: A Signature-Based Approach of Correctness Assurance in Data Outsourcing Scenarios. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2011. LNCS, vol. 7093, pp. 374–378. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  5. Goodrich, M.T., Tamassia, R., Triandopoulos, N.: Super-Efficient Verification of Dynamic Outsourced Databases. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 407–424. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  6. Xie, M., Wang, H., Yin, J.: Integrity Auditing of Outsourced Data. In: Conference on Very Large Databases, VLDB (2007)

    Google Scholar 

  7. Xie, M., Wang, H., Yin, J.: Providing Freshness Guarantees for Outsourced Databases. In: Conference on Extending Database Technology, EDBT (2008)

    Google Scholar 

  8. Mykletun, E., Narasimha, M.: Authentication and Integrity in Outsourced Databases. In: NDSS, Internet Security (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ghasemi, S., Noferesti, M., Hadavi, M.A., Dorri Nogoorani, S., Jalili, R. (2012). Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach. In: Venkatakrishnan, V., Goswami, D. (eds) Information Systems Security. ICISS 2012. Lecture Notes in Computer Science, vol 7671. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35130-3_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35130-3_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35129-7

  • Online ISBN: 978-3-642-35130-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics