Abstract
An important security challenge in database outsourcing scenarios is the correctness verification of query results. The proposed approaches in the literature, impose high overhead on both the service provider and specially the clients. In this paper, we propose the Trust-Based Fake Tuples approach to audit the correctness of query results. In this approach, some fake tuples are included among the real ones in order to verify the correctness of the results. The experience learnt from past results is used in this paper to evaluate the trust toward the service provider. This trust value is used to tune the number of fake tuples and subsequently the imposed overhead. As the trust value toward the service provider increases, the number of fake tuples and imposed overhead decreases. The experimental results confirm the effectiveness of our approach on the reduction of overhead while keeping the probability of incorrect results in its acceptable level.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hacigumus, H., Iyer, B.: Providing Database as a Service. In: International Conference of Data Engineering (2002)
Samarati, P., Capitani, S.D.: Data Protection in Outsourcing Scenarios: Issues and Directions. In: ASIACCS 2010 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 1–14 (2010)
Narasimha, M., Tsudik, G.: Authentication of Outsourced Databases Using Signature Aggregation and Chaining. In: Li Lee, M., Tan, K.-L., Wuwongse, V. (eds.) DASFAA 2006. LNCS, vol. 3882, pp. 420–436. Springer, Heidelberg (2006)
Noferesti, M., Hadavi, M.A., Jalili, R.: A Signature-Based Approach of Correctness Assurance in Data Outsourcing Scenarios. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2011. LNCS, vol. 7093, pp. 374–378. Springer, Heidelberg (2011)
Goodrich, M.T., Tamassia, R., Triandopoulos, N.: Super-Efficient Verification of Dynamic Outsourced Databases. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 407–424. Springer, Heidelberg (2008)
Xie, M., Wang, H., Yin, J.: Integrity Auditing of Outsourced Data. In: Conference on Very Large Databases, VLDB (2007)
Xie, M., Wang, H., Yin, J.: Providing Freshness Guarantees for Outsourced Databases. In: Conference on Extending Database Technology, EDBT (2008)
Mykletun, E., Narasimha, M.: Authentication and Integrity in Outsourced Databases. In: NDSS, Internet Security (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ghasemi, S., Noferesti, M., Hadavi, M.A., Dorri Nogoorani, S., Jalili, R. (2012). Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach. In: Venkatakrishnan, V., Goswami, D. (eds) Information Systems Security. ICISS 2012. Lecture Notes in Computer Science, vol 7671. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35130-3_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-35130-3_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35129-7
Online ISBN: 978-3-642-35130-3
eBook Packages: Computer ScienceComputer Science (R0)