Verifiable algorithm for outsourced database with updating

In cloud computing, by using the outsourcing technique, the clients can perform the complex tasks easily with the help of cloud computing. However, cloud service providers are usually untrusted, thus, the clients may lose the controllability of outsourced data. Therefore, it is important to guarantee the security of the outsourced data. In this paper, we focus on the security of outsourced database. A verification scheme for out-sourced database is proposed. In this scheme, the out-sourced data is disguised, and the cloud server cannot get the original data. If the cloud server returns dummy data (changed data, real data but not the required one), it will be detected by the clients easily. Furthermore, the clients can update the outsourced data, and a new proof will be generated to ensure the correctness of the data. The efficiency of data update is very high, and the computational cost of the client is low. This scheme is suitable for the resource-constrained devices, such as wearable devices.

[1]  Joan Feigenbaum,et al.  Locally random reductions: Improvements and applications , 1997, Journal of Cryptology.

[2]  Vinod Vaikuntanathan,et al.  How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption , 2012, IACR Cryptol. ePrint Arch..

[3]  Michael Backes,et al.  Verifiable delegation of computation on outsourced data , 2013, CCS.

[4]  Brent Waters,et al.  Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.

[5]  Joan Feigenbaum,et al.  Hiding Instances in Multioracle Queries , 1990, STACS.

[6]  Kim-Kwang Raymond Choo,et al.  Secure outsourcing of modular exponentiations under single untrusted programme model , 2017, J. Comput. Syst. Sci..

[7]  Eugene H. Spafford,et al.  Secure outsourcing of scientific computations , 2001, Adv. Comput..

[8]  Haiyan Zhang,et al.  Verifiable Delegation of Polynomials , 2016, Int. J. Netw. Secur..

[9]  Zhao Wang,et al.  Secure Outsourcing Algorithm of Polynomials in Cloud Computing , 2016, SEKE.

[10]  Kian-Lee Tan,et al.  Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.

[11]  Craig Gentry,et al.  Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.

[12]  Wei Gao,et al.  Improvement and applications of secure outsourcing of scientific computations , 2015, J. Ambient Intell. Humaniz. Comput..

[13]  Yevgeniy Vahlis,et al.  Verifiable Delegation of Computation over Large Datasets , 2011, IACR Cryptol. ePrint Arch..

[14]  Zheng Xu,et al.  Secure outsourcing of modular exponentiations in cloud and cluster computing , 2016, Cluster Computing.

[15]  Manuel Blum,et al.  Designing programs that check their work , 1989, STOC '89.

[16]  Dario Fiore,et al.  Vector Commitments and Their Applications , 2013, Public Key Cryptography.

[17]  Jun Ye,et al.  Verifiable Outsourcing of High-degree Polynomials and its Application in Keyword Search* , 2018 .

[18]  Mikhail J. Atallah,et al.  Private and Cheating-Free Outsourcing of Algebraic Computations , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.

[19]  Robert H. Deng,et al.  Authenticating Query Results in Data Publishing , 2005, ICICS.

[20]  Manuel Blum,et al.  Self-testing/correcting with applications to numerical problems , 1990, STOC '90.

[21]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .