Range query integrity in the cloud: the case of video surveillance

Cloud computing provides users with the possibility to store their data in third-party servers, but these data centers may be untrusted or susceptible to attacks. This issue becomes particularly crucial in the case a third-party cloud is used to store video surveillance data. A number of methods have been proposed in the literature to allow users to verify that query results are correct. However, in the considered scenario, in which efficiency is a critical factor, classical techniques for query integrity are little suitable. This paper proposes a new solution to overcome these drawbacks.

[1]  Michael Gertz,et al.  Authentic Third-party Data Publication , 2000, DBSec.

[2]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[3]  Kian-Lee Tan,et al.  Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.

[4]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[5]  Gunter Saake,et al.  Merkle Hash Tree based Techniques for Data Integrity of Outsourced Data , 2015, GvD.

[6]  Haixun Wang,et al.  A query integrity assurance scheme for accessing outsourced spatial databases , 2012, GeoInformatica.

[7]  Michael Gertz,et al.  Authentic Data Publication Over the Internet , 2003, J. Comput. Secur..

[8]  Francesco Buccafurri,et al.  Enhancing histograms by tree-like bucket indices , 2007, The VLDB Journal.

[9]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[10]  Pierangela Samarati Data Security and Privacy in the Cloud , 2014, ISPEC.

[11]  Antonino Nocera,et al.  PHIS: A system for scouting potential hubs and for favoring their "growth" in a Social Internetworking Scenario , 2012, Knowl. Based Syst..

[12]  Feifei Li,et al.  Authenticated Index Structures for Aggregation Queries , 2010, TSEC.

[13]  Xiaofeng Meng,et al.  Integrity Auditing of Outsourced Data , 2007, VLDB.

[14]  Jianfeng Ma,et al.  Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption , 2013, ESORICS.

[15]  Sushil Jajodia,et al.  Integrity for join queries in the cloud , 2013, IEEE Transactions on Cloud Computing.

[16]  Francesco Buccafurri,et al.  Accountability-Preserving Anonymous Delivery of Cloud Services , 2015, TrustBus.

[17]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[18]  Hakan Hacigümüs,et al.  Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model , 2003, DBSec.

[19]  Feifei Li,et al.  Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.

[20]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[21]  Francesco Buccafurri,et al.  Generating K-Anonymous Logs of People Tracing Systems in Surveilled Environments , 2014, SEBD.

[22]  Gene Tsudik,et al.  DSAC: integrity for outsourced databases with signature aggregation and chaining , 2005, CIKM '05.

[23]  Tao Wen,et al.  Query integrity verification based-on MAC chain in cloud storage , 2014, 2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS).

[24]  Philip S. Yu,et al.  Dual encryption for query integrity assurance , 2008, CIKM '08.

[25]  Jianliang Xu,et al.  Authentication of range query results in mapreduce environments , 2011, CloudDB '11.

[26]  Francesco Buccafurri,et al.  A Privacy-Preserving Solution for Tracking People in Critical Environments , 2014, 2014 IEEE 38th International Computer Software and Applications Conference Workshops.