Verifying Integrity of Big Data in Cloud Databases

While the user-base of cloud computing is growing rapidly, data owners worry about security of the data they store on clouds. Lack of appropriate control over the data might cause security violations. Therefore, all sensitive data stored in cloud databases must be protected at all times. This research paper outlines how data owners can keep their data secure and trustworthy, and how they can verify integrity of data in a cloud computing environment. The proposed model uses data partitioning to reach this goal. We have carried out performance analyses of the model through simulation and the results demonstrate the effectiveness of the model.

[1]  Hakan Hacigümüs,et al.  Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.

[2]  Hakan Hacigümüs,et al.  Encrypted Database Integrity in Database Service Provider Model , 2002, Certification and Security in E-Services.

[3]  Brajendra Panda,et al.  Facilitating Secure Query Processing on Encrypted Databases on the Cloud , 2016, 2016 IEEE International Conference on Smart Cloud (SmartCloud).

[4]  Feifei Li,et al.  Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.

[5]  Brajendra Panda,et al.  Efficiently Managing Encrypted Data in Cloud Databases , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[6]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[7]  Stephan Olariu,et al.  Data Integrity Evaluation in Cloud Database-as-a-Service , 2013, 2013 IEEE Ninth World Congress on Services.

[8]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[9]  Xiaofeng Meng,et al.  Providing freshness guarantees for outsourced databases , 2008, EDBT '08.

[10]  Gene Tsudik,et al.  Authentication and integrity in outsourced databases , 2006, TOS.

[11]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[12]  Xiaofeng Meng,et al.  Integrity Auditing of Outsourced Data , 2007, VLDB.