Providing Authentication and Integrity in Outsourced Databases using Merkle Hash Tree ’ s

In this paper we intend to describe and summarize results relating to the use of authenticated data structures, specifically Merkle Hash Tree’s, in the context of the Outsourced Database Model (ODB). In ODB, organizations outsource their data management needs to an external untrusted service provider. The service provider hosts clients’ databases and offers seamless mechanisms to create, store, update and access (query) their databases. Due to the service provider being untrusted, it becomes imperative to provide means to ensure authenticity and integrity in the query replies returned by the provider to clients. It is therefore the goal of this paper to outline an applicable data structure that can support authenticated query replies from the service provider to the clients (who issue the queries). Merkle Hash Tree’s (introduced in section 3) is such a data structure.

[1]  Michael Gertz,et al.  Authentic Third-party Data Publication , 2000, DBSec.

[2]  Hakan Hacigümüs,et al.  Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.

[3]  Hakan Hacigümüs,et al.  Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.

[4]  M. Goodrich,et al.  Efficient Authenticated Dictionaries with Skip Lists and Commutative Hashing , 2000 .

[5]  Moni Naor,et al.  Certificate revocation and certificate update , 1998, IEEE Journal on Selected Areas in Communications.

[6]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.

[7]  Paul C. Kocher On Certificate Revocation and Validation , 1998, Financial Cryptography.

[8]  Michael Gertz,et al.  A General Model for Authenticated Data Structures , 2004, Algorithmica.