Query integrity verification based-on MAC chain in cloud storage

In order to reduce data maintenance overhead, more and more enterprises outsource their data to the cloud storage, which provides flexible and on-demand storage service for companies. Data outsourcing also brings a lot of security problems, of which query integrity is a critical issue to be resolved. Current research mainly focuses on how to ensure correctness and completeness of the query integrity and pays little attention to freshness verification of query integrity. In this paper, we propose a scheme called MAC Chain for users to verify that their query results are correct, complete and fresh. Experiments show that our scheme does not only have a better performance but also support freshness verification.

[1]  Kian-Lee Tan,et al.  Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.

[2]  Michael T. Goodrich,et al.  Super-Efficient Verification of Dynamic Outsourced Databases , 2008, CT-RSA.

[3]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[4]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[5]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[6]  Yin Yang,et al.  CADS: Continuous Authentication on Data Streams , 2007, VLDB.

[7]  Praveen Gauravaram,et al.  Cryptographic Hash Functions , 2010, Encyclopedia of Information Assurance.

[8]  S Ramgovind,et al.  The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.

[9]  Kian-Lee Tan,et al.  Authenticating query results in edge computing , 2004, Proceedings. 20th International Conference on Data Engineering.

[10]  Zhang Min,et al.  Study on Cloud Computing Security , 2011 .

[11]  Wen Tao,et al.  Query Results Authentication of Outsourced Append-Only Databases , 2012 .

[12]  Ying Yin,et al.  Verifying correctness of inner product of vectors in cloud computing , 2013, Cloud Computing '13.

[13]  Chen Chi,et al.  Server Transparent Query Authentication of Outsourced Database , 2010 .

[14]  Mihir Bellare,et al.  Incremental cryptography and application to virus protection , 1995, STOC '95.

[15]  Gene Tsudik,et al.  DSAC: integrity for outsourced databases with signature aggregation and chaining , 2005, CIKM '05.

[16]  Ying Yin,et al.  Privacy Preserving Inner Product of Vectors in Cloud Computing , 2014, Int. J. Distributed Sens. Networks.

[17]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[18]  Dengguo Feng,et al.  Study on Cloud Computing Security: Study on Cloud Computing Security , 2011 .

[19]  Feifei Li,et al.  Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.

[20]  Xiaofeng Meng,et al.  Providing freshness guarantees for outsourced databases , 2008, EDBT '08.