IoT data security in outsourced databases: A survey of verifiable database

被引:0
|
作者
Chen, Ailin [1 ]
Yu, Shaoyuan [1 ]
Yang, Xinyi [2 ]
Huang, Ding [2 ]
Ren, Yongjun [2 ]
机构
[1] China Elect Power Res Inst, Nanjing 210003, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Engn Res Ctr Digital Forens, Sch Comp, Minist Educ, Nanjing 210000, Peoples R China
基金
中国国家自然科学基金;
关键词
IoT; Commitments; Verifiable database; Delegating polynomial functions; EFFICIENT REVOCATION; STORAGE MECHANISM; CLOUD STORAGE; ENCRYPTION; BLOCKCHAIN; COMPUTATION; OPERATIONS; INTERNET; SUPPORT; SCHEME;
D O I
10.1016/j.heliyon.2024.e28117
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the swift advancement of cloud computing and the Internet of Things (IoT), to address the issue of massive data storage, IoT devices opt to offload their data to cloud servers so as to alleviate the pressure of resident storage and computation. However, storing local data in an outsourced database is bound to face the danger of tampering. To handle the above problem, a verifiable database (VDB), which was initially suggested in 2011, has garnered sustained interest from researchers. The concept of VDB enables resource-limited clients to securely outsource extremely large databases to untrusted servers, where users can retrieve database records and modify them by allocating new values, and any attempts at tampering will be detected. This paper provides a systematic summary of VDB. First, a definition of VDB is given, along with correctness and security proofs. And the VDB based on commitment constructions is introduced separately, mainly divided into vector commitments and polynomial commitments. Then VDB schemes based on delegated polynomial functions are introduced, mainly in combination with Merkle trees and forward-secure symmetric searchable encryption. We then classify the current VDB schemes relying on four different assumptions. Besides, we classify the established VDB schemes built upon two different groups. Finally, we introduce the applications and future development of VDB. To our knowledge, this is the first VDB review paper to date.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] IntegriDB: Verifiable SQL for Outsourced Databases
    Zhang, Yupeng
    Katz, Jonathan
    Papamanthou, Charalampos
    [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1480 - 1491
  • [2] Data Security in Cloud computing and Outsourced Databases
    Bhukya, ShankarNayak
    Pabboju, Suresh
    Sharma, K. Venkatesh
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 2458 - 2462
  • [3] Verifiable Outsourced Computation: A Survey
    Gennaro, Rosario
    [J]. PROCEEDINGS OF THE ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING (PODC'17), 2017, : 313 - 313
  • [4] Verifiable algorithm for outsourced database with updating
    Guo, Zhen
    Li, Hui
    Cao, Chunjie
    Wei, Zhengxi
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3): : S5185 - S5193
  • [5] Verifiable algorithm for outsourced database with updating
    Zhen Guo
    Hui Li
    Chunjie Cao
    Zhengxi Wei
    [J]. Cluster Computing, 2019, 22 : 5185 - 5193
  • [6] Verifiable Set Operations over Outsourced Databases
    Canetti, Ran
    Paneth, Omer
    Papadopoulos, Dimitrios
    Triandopoulos, Nikos
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 113 - 130
  • [7] Verifiable Auditing for Outsourced Database in Cloud Computing
    Wang, Jianfeng
    Chen, Xiaofeng
    Huang, Xinyi
    You, Ilsun
    Xiang, Yang
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (11) : 3293 - 3303
  • [8] Publicly Verifiable Conjunctive Keyword Search in Outsourced Databases
    Azraoui, Monir
    Elkhiyaoui, Kaoutar
    Onen, Melek
    Molva, Refik
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 619 - 627
  • [9] Verifiable Computation on Outsourced Encrypted Data
    Lai, Junzuo
    Deng, Robert H.
    Pang, Hweehwa
    Weng, Jian
    [J]. COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 273 - 291
  • [10] Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud
    Yuan, Jiawei
    Yu, Shucheng
    [J]. 2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 520 - 524