Corpus ID: 241870

Data Integrity and Confidentiality in Outsourced Database

@inproceedings{Balpande2012DataIA,
  title={Data Integrity and Confidentiality in Outsourced Database},
  author={Sonal Balpande and Rajashree Shegde and L. Ragha},
  year={2012}
}
increasing number of enterprises outsource their IT functions or business processes to third-parties who offer these services with a lower cost due to the economy of scale. Quality of service has become a major concern in outsourcing. When database owners outsourced their data to service providers, which might be untrusted or compromised, two issues of data security emerge, data confidentiality and data integrity. Most of the previous research focuses on only one issue and the solution to… Expand
Encrypted Data Group Authentication for Outsourced Databases
TLDR
This paper proposes a privacy-aware query authentication index which guarantees data confidentiality and query result integrity for users and shows that proposed method outperforms the existing method in terms of range query processing time up to 3 times. Expand
A privacy-aware query authentication index for encrypted database in cloud
TLDR
Through performance evaluation, it is shown that proposed method outperforms the existing method in terms of range query processing time up to 3 times, and guarantees data confidentiality and query result integrity for users. Expand
A New Query Integrity Verification Method for Encrypted Data in Database Outsourcing
TLDR
This paper proposes a privacy-aware query authentication scheme which guarantees the data confidentiality and the query result integrity of sensitive data and devise a query result authentication index that stores an encrypted signature for each anchor so that it can reduce the amount of auditing data. Expand
A privacy-aware query authentication index for database outsourcing
TLDR
This paper proposes a privacy-aware query authentication which guarantees data confidentiality and query result integrity for users and shows that proposed method outperforms the existing method in terms of range query processing time up to 3 times. Expand
A New Query Integrity Verification Method with Cluster-based Data Transformation in Cloud Computing Environment
TLDR
This work proposes a privacy-aware query authentication scheme which guarantees the data confidentiality and the query result integrity of sensitive data and shows that the method outperforms the existing method in terms of query processing time and verification data size. Expand
A Density-Aware Data Encryption Scheme with Query Auditing Index for Secure Mobile Services
TLDR
Through performance evaluation, it is shown that the proposed scheme guarantees the high level of privacy preservation to users while providing better query processing performance, compared with the state-of-the-art schemes. Expand
Clustering-Based Query Result Authentication for Encrypted Databases in Cloud
  • Mi-Young Jang, M. Yoon, Deulnyeok Youn, Jae-Woo Chang
  • Computer Science
  • 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS)
  • 2014
TLDR
A clustering-based data transformation technique and a privacy-aware query authentication index designed to select anchors based on data distribution that outperforms the existing method up to 15 times in terms of query processing time and verification. Expand

References

SHOWING 1-10 OF 17 REFERENCES
Authentication and integrity in outsourced databases
TLDR
This work provides mechanisms to ensure data integrity and authenticity for outsourced databases that assure the querier that the query results have not been tampered with and are authentic (with respect to the actual data owner). Expand
Bucket‐based authentication for outsourced databases
TLDR
This paper proposes bucket‐based authentication that can keep data confidentiality and meanwhile guarantee data integrity, and proposes a new approach based on bucket checksum, which can be used for the authentication of multiple tuples at one time. Expand
Balancing confidentiality and efficiency in untrusted relational DBMSs
TLDR
This paper presents a simple yet robust single-server solution for remote querying of encrypted databases on untrusted servers based on the use of indexing information attached to the encrypted database which can be used by the server to select the data to be returned in response to a query without the need of disclosing the database content. Expand
Separating Authentication from Query Execution in Outsourced Databases
TLDR
This paper presents SAE, a novel outsourcing model that separates authentication from query execution, and outperforms TOM in every aspect, including processing cost for all parties involved, communication overhead, query response time and ease of implementation in practical applications. Expand
Verifying completeness of relational query results in data publishing
TLDR
This paper introduces a scheme for users to verify that their query results are complete and authentic, and supports range selection on key and non-key attributes and join queries on relational databases. Expand
Dynamic authenticated index structures for outsourced databases
TLDR
This work defines a variety of essential and practical cost metrics associated with ODB systems and looks at solutions that can handle dynamic scenarios, where owners periodically update the data residing at the servers, both for static and dynamic environments. Expand
Executing SQL over encrypted data in the database-service-provider model
TLDR
The paper explores an algebraic framework to split the query to minimize the computation at the client site, and explores techniques to execute SQL queries over encrypted data. Expand
LOB: Bucket Based Index for Range Queries
  • J. Wang, Xiaoyong Du
  • Computer Science
  • 2008 The Ninth International Conference on Web-Age Information Management
  • 2008
TLDR
This paper proposes a local overlapping bucket algorithm (LOB) with time complexity of O(nlogn), where n represents the cardinality of the table and shows that the algorithm can achieve higher security by trading off efficiency. Expand
Authentic Third-party Data Publication
TLDR
This paper focuses on integrity critical databases, such as financial data used in high-value decisions, which are frequently published over the Internet and must satisfy the integrity, authenticity, and non-repudiation requirements of clients. Expand
Providing database as a service
We explore a novel paradigm for data management in which a third party service provider hosts "database as a service", providing its customers with seamless mechanisms to create, store, and accessExpand
...
1
2
...