Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop 2012
DOI: 10.1145/2381913.2381927
|View full text |Cite
|
Sign up to set email alerts
|

Efficient query integrity for outsourced dynamic databases

Abstract: As databases are increasingly outsourced to the cloud, data owners require various security assurances. This paper investigates one particular assurance, query integrity, by which a database querier (either the data owner or a third party) can verify that its queries were faithfully executed by the cloud server with respect to the outsourced database. Query integrity is investigated in the setting of dynamic databases, where the outsourced databases can be updated by the data owners as needed. We present a for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 28 publications
(24 citation statements)
references
References 34 publications
0
24
0
Order By: Relevance
“…Though there has been considerable amount of work on authenticated query processing on relational databases, but it has been acknowledged (for example in [37]) that the problem of query authentication largely remains open. An unified cryptographic treatment of the problem is missing in the literature.…”
Section: Incomplete Resultmentioning
confidence: 99%
See 2 more Smart Citations
“…Though there has been considerable amount of work on authenticated query processing on relational databases, but it has been acknowledged (for example in [37]) that the problem of query authentication largely remains open. An unified cryptographic treatment of the problem is missing in the literature.…”
Section: Incomplete Resultmentioning
confidence: 99%
“…Providing an experimental comparison of our scheme with the existing ones is beyond the scope of this work. Some authors (for example [37]) compare the storage and communication cost of the protocols in asymptotic terms, which also do not reveal the complete picture. Here we would point out some of the differences of our framework in comparison to the others with respect to functionality and costs.…”
Section: Discussion and Comparisonsmentioning
confidence: 99%
See 1 more Smart Citation
“…A number of techniques [11], [13], [7], [9], [10], [14], [8], [12], [16] have been proposed, aiming to provide both completeness and correctness of queries to remote databases. These existing techniques can be mainly divided into two groups: tree-based techniques [11], [7], [8], [12] and signature-based techniques [13], [9], [10], [14].…”
Section: Introductionmentioning
confidence: 99%
“…Trivial extension of these techniques for enabling more aggregation queries inevitably introduces tremendous communication cost or storage overhead for the system. Using homomorphic authenticators, Zheng et.al [16] recently proposed an integrity checking scheme that supports weighted sum query in addition to simple SQL queries. Their signature design allow all attributes in one tuple to share one signature and make the storage overhead independent to the number of attributes.…”
Section: Introductionmentioning
confidence: 99%