Efficient integrity checks for join queries in the cloud

Cloud computing is receiving massive interest from users and companies for its convenient support of scalable access to data and services. The variety and diversification of offers by cloud providers allow users to selectively adopt storage and computational services as they best suit their needs, including cost saving considerations. In such an open context, security remains a major concern, as confidentiality and integrity of data and queries over them can be at risk. In this paper, we present efficient techniques to verify the integrity of join queries computed by potentially untrusted cloud providers, while also protecting data and computation confidentiality. Our techniques support joins among multiple data sources and introduce a limited overhead in query computation, enabling also economical savings, as the ability to assess integrity increases the spectrum of offers that can be considered for performing the computation. Formal analysis and experimental evaluations confirm the effectiveness and efficiency of our solutions.

[1]  Sushil Jajodia,et al.  Integrity for Approximate Joins on Untrusted Computational Servers , 2015, SEC.

[2]  Kian-Lee Tan,et al.  Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.

[3]  Cong Wang,et al.  Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.

[4]  Sushil Jajodia,et al.  Integrity for distributed queries , 2014, 2014 IEEE Conference on Communications and Network Security.

[5]  Xiaofeng Meng,et al.  Integrity Auditing of Outsourced Data , 2007, VLDB.

[6]  Jianliang Xu,et al.  Authentication of range query results in mapreduce environments , 2011, CloudDB '11.

[7]  Feifei Li,et al.  Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.

[8]  Xiaofeng Meng,et al.  Providing freshness guarantees for outsourced databases , 2008, EDBT '08.

[9]  K.J.Jagdish Devi Parvathy Mohan Dynamic Audit Services for Outsourced Storages in Clouds , 2014 .

[10]  Gene Tsudik,et al.  Authentication and integrity in outsourced databases , 2006, TOS.

[11]  Vincenzo Piuri,et al.  Fault Tolerance Management in Cloud Computing: A System-Level Perspective , 2013, IEEE Systems Journal.

[12]  Hakan Hacigümüs,et al.  Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model , 2003, DBSec.

[13]  Hakan Hacigümüs,et al.  Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.

[14]  Feifei Li,et al.  Authenticated Index Structures for Aggregation Queries , 2010, TSEC.

[15]  V. Piuri,et al.  Fault tolerance management in IaaS clouds , 2012, 2012 IEEE First AESS European Conference on Satellite Telecommunications (ESTEL).

[16]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[17]  Sabrina De Capitani di Vimercati,et al.  Managing and accessing data in the cloud: Privacy risks and approaches , 2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS).

[18]  Ying Yin,et al.  Verifying correctness of inner product of vectors in cloud computing , 2013, Cloud Computing '13.

[19]  Pierangela Samarati,et al.  Cloud Security: Issues and Concerns , 2016 .

[20]  Vincenzo Piuri,et al.  Supporting Security Requirements for Resource Management in Cloud Computing , 2012, 2012 IEEE 15th International Conference on Computational Science and Engineering.

[21]  Sushil Jajodia,et al.  Encryption policies for regulating access to outsourced data , 2010, TODS.

[22]  Sushil Jajodia,et al.  Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.

[23]  Sushil Jajodia,et al.  Enforcing Subscription-Based Authorization Policies in Cloud Scenarios , 2012, DBSec.

[24]  Stephan Olariu,et al.  Data Integrity Evaluation in Cloud Database-as-a-Service , 2013, 2013 IEEE Ninth World Congress on Services.

[25]  Salve Bhagyashri Salve Bhagyashri,et al.  Privacy Preserving Public Auditing for Secure Cloud Storage , 2014 .

[26]  Nora Cuppens-Boulahia,et al.  Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation , 2014, IEEE Transactions on Information Forensics and Security.

[27]  Tim Kraska,et al.  An evaluation of alternative architectures for transaction processing in the cloud , 2010, SIGMOD Conference.

[28]  Philip S. Yu,et al.  Dual encryption for query integrity assurance , 2008, CIKM '08.

[29]  Jaideep Vaidya,et al.  Privacy-Preserving Collaborative Filtering on the Cloud and Practical Implementation Experiences , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.

[30]  Sushil Jajodia,et al.  Optimizing Integrity Checks for Join Queries in the Cloud , 2014, DBSec.

[31]  Ashutosh Saxena,et al.  Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach , 2013, ICISS.

[32]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[33]  Sushil Jajodia,et al.  Integrity for join queries in the cloud , 2013, IEEE Transactions on Cloud Computing.