• Corpus ID: 241870

Data Integrity and Confidentiality in Outsourced Database

@inproceedings{Balpande2012DataIA,
  title={Data Integrity and Confidentiality in Outsourced Database},
  author={Sonal Balpande and Rajashree Shegde and Lata R. Ragha},
  year={2012}
}
increasing number of enterprises outsource their IT functions or business processes to third-parties who offer these services with a lower cost due to the economy of scale. Quality of service has become a major concern in outsourcing. When database owners outsourced their data to service providers, which might be untrusted or compromised, two issues of data security emerge, data confidentiality and data integrity. Most of the previous research focuses on only one issue and the solution to… 

Figures and Tables from this paper

Encrypted Data Group Authentication for Outsourced Databases

This paper proposes a privacy-aware query authentication index which guarantees data confidentiality and query result integrity for users and shows that proposed method outperforms the existing method in terms of range query processing time up to 3 times.

A privacy-aware query authentication index for encrypted database in cloud

Through performance evaluation, it is shown that proposed method outperforms the existing method in terms of range query processing time up to 3 times, and guarantees data confidentiality and query result integrity for users.

A New Query Integrity Verification Method for Encrypted Data in Database Outsourcing

This paper proposes a privacy-aware query authentication scheme which guarantees the data confidentiality and the query result integrity of sensitive data and devise a query result authentication index that stores an encrypted signature for each anchor so that it can reduce the amount of auditing data.

A privacy-aware query authentication index for database outsourcing

This paper proposes a privacy-aware query authentication which guarantees data confidentiality and query result integrity for users and shows that proposed method outperforms the existing method in terms of range query processing time up to 3 times.

A New Query Integrity Verification Method with Cluster-based Data Transformation in Cloud Computing Environment

This work proposes a privacy-aware query authentication scheme which guarantees the data confidentiality and the query result integrity of sensitive data and shows that the method outperforms the existing method in terms of query processing time and verification data size.

A Density-Aware Data Encryption Scheme with Query Auditing Index for Secure Mobile Services

Through performance evaluation, it is shown that the proposed scheme guarantees the high level of privacy preservation to users while providing better query processing performance, compared with the state-of-the-art schemes.

Clustering-Based Query Result Authentication for Encrypted Databases in Cloud

  • Mi-Young JangM. YoonDeulnyeok YounJae-Woo Chang
  • Computer Science
    2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS)
  • 2014
A clustering-based data transformation technique and a privacy-aware query authentication index designed to select anchors based on data distribution that outperforms the existing method up to 15 times in terms of query processing time and verification.

References

SHOWING 1-10 OF 17 REFERENCES

Authentication and integrity in outsourced databases

This work provides mechanisms to ensure data integrity and authenticity for outsourced databases that assure the querier that the query results have not been tampered with and are authentic (with respect to the actual data owner).

Bucket‐based authentication for outsourced databases

This paper proposes bucket‐based authentication that can keep data confidentiality and meanwhile guarantee data integrity, and proposes a new approach based on bucket checksum, which can be used for the authentication of multiple tuples at one time.

Balancing confidentiality and efficiency in untrusted relational DBMSs

This paper presents a simple yet robust single-server solution for remote querying of encrypted databases on untrusted servers based on the use of indexing information attached to the encrypted database which can be used by the server to select the data to be returned in response to a query without the need of disclosing the database content.

Separating Authentication from Query Execution in Outsourced Databases

This paper presents SAE, a novel outsourcing model that separates authentication from query execution, and outperforms TOM in every aspect, including processing cost for all parties involved, communication overhead, query response time and ease of implementation in practical applications.

Dynamic authenticated index structures for outsourced databases

This work defines a variety of essential and practical cost metrics associated with ODB systems and looks at solutions that can handle dynamic scenarios, where owners periodically update the data residing at the servers, both for static and dynamic environments.

Executing SQL over encrypted data in the database-service-provider model

The paper explores an algebraic framework to split the query to minimize the computation at the client site, and explores techniques to execute SQL queries over encrypted data.

LOB: Bucket Based Index for Range Queries

  • Jieping WangXiaoyong Du
  • Computer Science
    2008 The Ninth International Conference on Web-Age Information Management
  • 2008
This paper proposes a local overlapping bucket algorithm (LOB) with time complexity of O(nlogn), where n represents the cardinality of the table and shows that the algorithm can achieve higher security by trading off efficiency.

Authentic Third-party Data Publication

This paper focuses on integrity critical databases, such as financial data used in high-value decisions, which are frequently published over the Internet and must satisfy the integrity, authenticity, and non-repudiation requirements of clients.

Providing database as a service

We explore a novel paradigm for data management in which a third party service provider hosts "database as a service", providing its customers with seamless mechanisms to create, store, and access

Cluster Based Partition for Multi-dimensional Range Query in DAS Model

Database-as-a-Service (DAS) is an emerging database management paradigm wherein querying on encrypted data directly is a performance critical problem, to which partition based index is an effective