Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach

Enterprises outsource data to storage service providers in order to avail resources at lower costs and for ensuring economy of scale. Prime concerns of organizations are privacy of data and quality of service provided, which include correctness of query results and integrity of data. In earlier works, integrity of data is verified by preserving hash of tuple data as header attribute and completeness is assured by inserting and retrieving fake tuples. In this work, we propose a secret sharing based approach for deterministic generation of fake tuples used for verifying completeness and integrity of data, where we eliminate the dependency on header attribute. Our integrity check mechanisms work faster than existing approaches in this direction as depicted in our experimental results. Furthermore, we show that our approach is information theoretically secure, where an adversary without knowledge of underlying security parameters can never be able to break the scheme.

[1]  Tal Malkin Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings , 2008, CT-RSA.

[2]  Rasool Jalili,et al.  A Signature-Based Approach of Correctness Assurance in Data Outsourcing Scenarios , 2011, ICISS.

[3]  Josef Pieprzyk,et al.  Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings , 2008, ASIACRYPT.

[4]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[5]  Michael T. Goodrich,et al.  Super-Efficient Verification of Dynamic Outsourced Databases , 2008, CT-RSA.

[6]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, ASIACRYPT.

[7]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[8]  Rasool Jalili,et al.  Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach , 2012, ICISS.

[9]  Hakan Hacigümüs,et al.  Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.

[10]  Gene Tsudik,et al.  Authentication of Outsourced Databases Using Signature Aggregation and Chaining , 2006, DASFAA.

[11]  Xiaofeng Meng,et al.  Integrity Auditing of Outsourced Data , 2007, VLDB.

[12]  Stephen S. Yau,et al.  Dynamic audit services for integrity verification of outsourced storages in clouds , 2011, SAC.