Skip to main content

Query Authentication over Cloud Data from Multiple Contributors

  • Conference paper
  • 3256 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8709))

Abstract

As data stored in the cloud may encounter the malicious attack from the cloud service provider (CSP), to ensure data authenticity and integrity, it is necessary to authenticate the query results from CSP. However, most existing authentication methods focus on query over data from a single contributor in the outsourced database. This paper puts forward authentication method for query over data from multiple contributors in the cloud environment. The method can validate data from multiple contributors on only one authentication data structure (ADS) based on Merkle Hash Tree (MHT), which achieves low storage costs and high computational efficiency. Experimental results show that our mechanism can efficiently enable query authentication over cloud data from multiple contributors.

This work is partially supported by National Natural Science Foundation of China No. 61202034, 61232002, and Program for Innovative Research Team of Wuhan, No. 2014070504020237

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fox, A., Griffith, R., et al.: Above the clouds: A berkeley view of cloudcomputing. Dept. Electrical Eng. and Comput. Sciences, University ofCalifornia, Berkeley, Tech. Rep. UCB/EECS, vol. 28 (2009)

    Google Scholar 

  2. Hacigümüs, H., Mehrotra, S., Iyer, B.R.: Providing Database as a Service. In: Proceedings of the 18th International Conference on Data Engineering, pp. 29–40 (2002)

    Google Scholar 

  3. Narasimha, M., Tsudik, G.: Authentication of outsourced databases using signature aggregation and chaining. In: Li Lee, M., Tan, K.-L., Wuwongse, V. (eds.) DASFAA 2006. LNCS, vol. 3882, pp. 420–436. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  4. Pang, H., Jain, A., Ramamritham, K., et al.: Verifying completeness of relational query results in data publishing. In: Proceedings of ACM SIGMOD Conference (SIGMOD 2005), Baltimore, Maryland, USA (2005)

    Google Scholar 

  5. Mykletun, E., Narasimha, M., Tsudik, G.: Providing authentication and integrity in outsourced databases using Merkle hash trees. UCI-SCONCE Technical Report[R/OL] (2003), http://sconce.ics.uci.edu/das/MerkleODB.pdf

  6. Li, F., Hadjieleftheriouz, M., Kolliosy, G., et al.: Dynamic authenticated index structures for outsourced databases. In: Proceedings of ACM SIGMOD Conference (SIGMOD 2006), Chicago, Illinois, USA (2006)

    Google Scholar 

  7. Cheng, W., Pang, H., Tan, K.-L.: Authenticating multi-dimensional query results in data publishing. In: Damiani, E., Liu, P. (eds.) Data and Applications Security 2006. LNCS, vol. 4127, pp. 60–73. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  8. Yang, Y., Papadopoulos, S., Papadias, D., et al.: Authenticated indexing for outsourced spatial databases. VLDB Journal (2009)

    Google Scholar 

  9. Li, F., Hadjieleftheriouz, M., Kolliosy, G., et al.: Authenticated index structures for aggregation queries in outsourced databases, BUCS-TR-2006-011[R] (2006)

    Google Scholar 

  10. Sion, R.: Query execution assurance for outsourced databases. In: Proceedings of International Conference on Very Large Data Bases(VLDB 2005), Trondheim, Norway (2005)

    Google Scholar 

  11. Xie, M., Wang, H.J., Yin, J., et al.: Integrity auditing of outsourced data. In: Proceedings of International Conference on Very Large Data Bases(VLDB 2007), Vienna, Austria (2007)

    Google Scholar 

  12. Wang, H.J., Yin, J., Perng, C., et al.: Dual encryption for query integrity assurance. In: Proceedings of ACM Conference on Information and Knowledge Management (CIKM 2008), Napa Valley, California, USA (2008)

    Google Scholar 

  13. Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Xie, G., Peng, Z., Song, W. (2014). Query Authentication over Cloud Data from Multiple Contributors. In: Chen, L., Jia, Y., Sellis, T., Liu, G. (eds) Web Technologies and Applications. APWeb 2014. Lecture Notes in Computer Science, vol 8709. Springer, Cham. https://doi.org/10.1007/978-3-319-11116-2_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11116-2_41

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11115-5

  • Online ISBN: 978-3-319-11116-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics