Authenticating multi-dimensional query results in outsourced database

In the outsourced database model, the third-party server provides query services to users on behalf of the data owner. However, the service provider may be unreliable or susceptible to attacks. The service provider can also produce inauthentic or incomplete query results. An authentication scheme for multi-dimensional data is proposed in the present study to investigate this problem. The authors introduce a new concept of tower head node based on the k -dimensional skip list and use it to construct a new authenticated data structure. This structure supports both multi-dimensional range query and dynamic maintenance. They also show how to verify the authenticity and completeness of query results on multi-dimensional datasets in the outsourced database model. Moreover, this structure can be fully outsourced, thus the service provider can perform the entire maintenance, which is crucial for users with limited computational resources. The proof of security and the evaluation of experiment demonstrate that the scheme is secure and outperforms previous schemes in terms of the construction cost, proof size, query time, verification time and update cost.

[1]  Kian-Lee Tan,et al.  Query assurance verification for outsourced multi-dimensional databases , 2009, J. Comput. Secur..

[2]  Yin Yang,et al.  Authenticated indexing for outsourced spatial databases , 2009, The VLDB Journal.

[3]  Xiaohua Jia,et al.  An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.

[4]  Xinwen Fu,et al.  Optimizing Aggregate Query Processing in Cloud Data Warehouses , 2014, Globe.

[5]  M. Mrinalni Vaknishadh,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2012 .

[6]  Jiwu Shu,et al.  Shield: A stackable secure storage system for file sharing in public storage , 2014, J. Parallel Distributed Comput..

[7]  Xiaoming Wang,et al.  A query verification scheme for dynamic outsourced databases , 2012, J. Comput..

[8]  Kian-Lee Tan,et al.  Authenticating Multi-dimensional Query Results in Data Publishing , 2006, DBSec.

[9]  Sushil Jajodia,et al.  Optimizing Integrity Checks for Join Queries in the Cloud , 2014, DBSec.

[10]  Kian-Lee Tan,et al.  Verifying Completeness of Relational Query Answers from Online Servers , 2008, TSEC.

[11]  Michael Gertz,et al.  Authentic Data Publication Over the Internet , 2003, J. Comput. Secur..

[12]  Xiaoming Wang,et al.  Data integrity verification scheme with designated verifiers for dynamic outsourced databases , 2014, Secur. Commun. Networks.

[13]  Sushil Jajodia,et al.  Integrity for join queries in the cloud , 2013, IEEE Transactions on Cloud Computing.

[14]  Yixian Yang,et al.  Multiple-File Remote Data Checking for cloud storage , 2012, Comput. Secur..

[15]  Kian-Lee Tan,et al.  Authenticating kNN Query Results in Data Publishing , 2007, Secure Data Management.

[16]  Li Xu,et al.  Data dynamics for remote data possession checking in cloud storage , 2013, Comput. Electr. Eng..