A privacy-aware query authentication index for encrypted database in cloud

Cloud computing has been spotlighted as a new paradigm of database management system. However, cloud service provider might be untrusted so that two issues of data security, including data confidentiality and query result integrity, become major concerns for users. Existing bucket-based data authentication methods have problems of data disclosure and transmission overhead, due to the unsophisticated data grouping strategy. In this paper, we propose a privacy-aware query authentication index which guarantees data confidentiality and query result integrity for users. We privately partition a spatial database into small groups by using periodic function and generate a signature of each group. The group signature is used to check the correctness and completeness of outsourced data when answering a range query to users. Through performance evaluation, it is shown that proposed method outperforms the existing method in terms of range query processing time up to 3 times.

[1]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[2]  Murat Kantarcioglu,et al.  Secure multidimensional range queries over outsourced data , 2012, The VLDB Journal.

[3]  Erhan Bozdag,et al.  An empirical research for CNC technology implementation in manufacturing SMEs , 2007 .

[4]  Kitae Shin,et al.  An assessment of the level of informatization in the Korea mold industry as a prerequisite for e-collaboration: an exploratory empirical investigation , 2006 .

[5]  Panos Kalnis,et al.  Outsourcing Search Services on Private Spatial Data , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[6]  Hakan Hacigümüs,et al.  Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.

[7]  Wei-Shinn Ku,et al.  Efficient evaluation of skyline queries in wireless data broadcast environments , 2012, SIGSPATIAL/GIS.

[8]  Yin Yang,et al.  Authenticated join processing in outsourced databases , 2009, SIGMOD Conference.

[9]  Qing Li,et al.  Enterprise information system project selection with regard to BOCR , 2008 .

[10]  Dirk Fox,et al.  Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.

[11]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[12]  Qing Li,et al.  Performance evaluation for Industrial Automation System Integration based on enterprise architecture standards and application in Cotton Textile Industry , 2011, 2011 International Conference on System science, Engineering design and Manufacturing informatization.

[13]  Lakshman S. Thakur,et al.  Advanced manufacturing techniques and information technology adoption in India: A current perspective and some comparisons , 2008 .

[14]  Yannis Theodoridis,et al.  On the Generation of Spatiotemporal Datasets , 1999 .

[15]  TsudikGene,et al.  Authentication and integrity in outsourced databases , 2006 .

[16]  Hyun-Han Kwon,et al.  Evaluation of typhoon‐induced rainfall using nonparametric Monte Carlo simulation and locally weighted polynomial regression , 2011 .

[17]  Michael Gertz,et al.  Authentic Data Publication Over the Internet , 2003, J. Comput. Secur..

[18]  W. Cleveland,et al.  Locally Weighted Regression: An Approach to Regression Analysis by Local Fitting , 1988 .

[19]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[20]  Gene Tsudik,et al.  Authentication and integrity in outsourced databases , 2006, TOS.

[21]  Xiaoyong Du,et al.  A Secure Multi-dimensional Partition Based Index in DAS , 2008, APWeb.

[22]  Lata Ragha,et al.  Data Integrity and Confidentiality in Outsourced Database , 2012 .

[23]  Simon Heron,et al.  Encryption: Advanced Encryption Standard (AES) , 2009 .

[24]  Dongxi Liu,et al.  Query encrypted databases practically , 2012, CCS '12.

[25]  Xiaoyong Du,et al.  Bucket‐based authentication for outsourced databases , 2010, Concurr. Comput. Pract. Exp..

[26]  Gene Tsudik,et al.  A Privacy-Preserving Index for Range Queries , 2004, VLDB.

[27]  Elisa Bertino,et al.  PEAR: a hardware based protocol authentication system , 2010, SPRINGL '10.

[28]  Dimitris Sacharidis,et al.  K-anonymity in the Presence of External Databases , 2022 .

[29]  Changxiu Cao,et al.  Locally weighted regression for desulphurisation intelligent decision system modeling , 2004, Simul. Model. Pract. Theory.

[30]  Q. Henry Wu,et al.  Electric Load Forecasting Based on Locally Weighted Support Vector Regression , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[31]  Jian Zhou,et al.  Fuzzy Rule-based Integrated System Multi-indicators Economic Performance Evaluation and Decision Making Support Framework , 2005, International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06).

[32]  Gene Tsudik,et al.  Signature Bouquets: Immutability for Aggregated/Condensed Signatures , 2004, ESORICS.

[33]  Gene Tsudik,et al.  DSAC: integrity for outsourced databases with signature aggregation and chaining , 2005, CIKM '05.