A Parity-Based Data Outsourcing Model for Query Authentication and Correction

We propose a Parity-based Data Outsourcing(PDO) model in this paper. This model outsources a set of raw data by associating it with a set of parity data and then distributing both sets of data among a number of cloud servers that are managed independently by different service providers. Users query the servers for the data of their interest and are allowed to perform both authentication and correction. The former refers to the capability of verifying if the query result they receive is correct (i.e., all data items that satisfy the query condition are received, and every data item received is original from the data owner), whereas the latter, the capability of correcting the corrupted data, if any. A data item may be corrupted unintentionally (e.g, because of errors in systems and/or networking) or intentionally (e.g., by malicious service providers or because of systems being compromised by hackers). Existing techniques support only query authentication, but not error correction. Moreover, they all rely on complex cryptographic techniques and require the cloud server to build verification objects. In contrast, our approach achieves both without using any encryption. It does not require to install any additional software on a cloud server and thus can take advantage of the many cloud data management services available on the market today. We address the challenges of PDO implementation, including parity coding, database encoding, data retrieval, and database insertion and deletion, and evaluate the performance potential of PDO through analysis, simulation, and prototyping. Our results indicate its excellent performance in terms of storage, communication, and computation overhead.

[1]  Kian-Lee Tan,et al.  Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.

[2]  Jonathan Katz,et al.  Introduction to Modern Cryptography: Principles and Protocols , 2007 .

[3]  Richard W. Hamming,et al.  Error detecting and error correcting codes , 1950 .

[4]  Man Lung Yiu,et al.  Authentication of moving kNN queries , 2011, 2011 IEEE 27th International Conference on Data Engineering.

[5]  Yin Yang,et al.  Authenticated indexing for outsourced spatial databases , 2009, The VLDB Journal.

[6]  Jianliang Xu,et al.  Authenticating Location-Based Skyline Queries in Arbitrary Subspaces , 2014, IEEE Transactions on Knowledge and Data Engineering.

[7]  Jianliang Xu,et al.  Authentication of location-based skyline queries , 2011, CIKM '11.

[8]  Kian-Lee Tan,et al.  Authenticating Multi-dimensional Query Results in Data Publishing , 2006, DBSec.

[9]  R. Cuninghame-Green,et al.  Applied Linear Algebra , 1979 .

[10]  Cyrus Shahabi,et al.  Spatial Query Integrity with Voronoi Neighbors , 2013, IEEE Transactions on Knowledge and Data Engineering.

[11]  G. David Forney,et al.  Generalized minimum distance decoding , 1966, IEEE Trans. Inf. Theory.

[12]  David Chase,et al.  Code Combining - A Maximum-Likelihood Decoding Approach for Combining an Arbitrary Number of Noisy Packets , 1985, IEEE Transactions on Communications.

[13]  F. Moore,et al.  Polynomial Codes Over Certain Finite Fields , 2017 .

[14]  M. Chiani Error Detecting and Error Correcting Codes , 2012 .

[15]  Yuzhe Tang,et al.  Outsourcing multi-version key-value stores with verifiable data freshness , 2014, 2014 IEEE 30th International Conference on Data Engineering.

[16]  Yin Yang,et al.  Spatial Outsourcing for Location-based Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[17]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[18]  Kian-Lee Tan,et al.  Authenticating kNN Query Results in Data Publishing , 2007, Secure Data Management.

[19]  Cyrus Shahabi,et al.  Authentication of k Nearest Neighbor Query on Road Networks , 2014, IEEE Transactions on Knowledge and Data Engineering.

[20]  Michael Gertz,et al.  Authentic Data Publication Over the Internet , 2003, J. Comput. Secur..

[21]  Mikhail J. Atallah,et al.  Efficient Distributed Third-Party Data Authentication for Tree Hierarchies , 2008, 2008 The 28th International Conference on Distributed Computing Systems.