Optimizing Integrity Checks for Join Queries in the Cloud

The large adoption of the cloud paradigm is introducing more and more scenarios where users can access data and services with an unprecedented convenience, just relying on the storage and computational power offered by external providers. Also, users can enjoy a diversity and variety of offers, with the possibility of choosing services by different providers as they best suit their needs. With the growth of the market, economic factors have become one of the crucial aspects in the choice of services. However, security remains a major concern and users will be free to actually benefit from the diversity and variety of such offers only if they can also have proper security guarantees on the services. In this paper, we build upon a recent proposal for assessing integrity of computations performed by potentially untrusted providers introducing some optimizations, thus limiting the overhead to be paid for integrity guarantees, and making it suitable to more scenarios.

[1]  Xiaofeng Meng,et al.  Providing freshness guarantees for outsourced databases , 2008, EDBT '08.

[2]  Sushil Jajodia,et al.  Encryption policies for regulating access to outsourced data , 2010, TODS.

[3]  Sushil Jajodia,et al.  Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.

[4]  Sushil Jajodia,et al.  Enforcing Subscription-Based Authorization Policies in Cloud Scenarios , 2012, DBSec.

[5]  Hakan Hacigümüs,et al.  Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.

[6]  Feifei Li,et al.  Authenticated Index Structures for Aggregation Queries , 2010, TSEC.

[7]  Gene Tsudik,et al.  Authentication and integrity in outsourced databases , 2006, TOS.

[8]  Vincenzo Piuri,et al.  Fault Tolerance Management in Cloud Computing: A System-Level Perspective , 2013, IEEE Systems Journal.

[9]  Sabrina De Capitani di Vimercati,et al.  Managing and accessing data in the cloud: Privacy risks and approaches , 2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS).

[10]  Tim Kraska,et al.  An evaluation of alternative architectures for transaction processing in the cloud , 2010, SIGMOD Conference.

[11]  Sushil Jajodia,et al.  Integrity for join queries in the cloud , 2013, IEEE Transactions on Cloud Computing.

[12]  John R. Vacca Computer and Information Security Handbook , 2009 .

[13]  Jaideep Vaidya,et al.  Privacy-Preserving Collaborative Filtering on the Cloud and Practical Implementation Experiences , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.

[14]  Feifei Li,et al.  Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.

[15]  Vincenzo Piuri,et al.  Chapter 1 – Fault Tolerance and Resilience in Cloud Computing Environments , 2014 .

[16]  Jianliang Xu,et al.  Authentication of range query results in mapreduce environments , 2011, CloudDB '11.

[17]  Nora Cuppens-Boulahia,et al.  Data and Applications Security and Privacy XXVI , 2012, Lecture Notes in Computer Science.

[18]  Kian-Lee Tan,et al.  Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.

[19]  Philip S. Yu,et al.  Dual encryption for query integrity assurance , 2008, CIKM '08.

[20]  Cong Wang,et al.  Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.

[21]  Xiaofeng Meng,et al.  Integrity Auditing of Outsourced Data , 2007, VLDB.