IoT data security in outsourced databases: A survey of verifiable database

被引:0
|
作者
Chen, Ailin [1 ]
Yu, Shaoyuan [1 ]
Yang, Xinyi [2 ]
Huang, Ding [2 ]
Ren, Yongjun [2 ]
机构
[1] China Elect Power Res Inst, Nanjing 210003, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Engn Res Ctr Digital Forens, Sch Comp, Minist Educ, Nanjing 210000, Peoples R China
基金
中国国家自然科学基金;
关键词
IoT; Commitments; Verifiable database; Delegating polynomial functions; EFFICIENT REVOCATION; STORAGE MECHANISM; CLOUD STORAGE; ENCRYPTION; BLOCKCHAIN; COMPUTATION; OPERATIONS; INTERNET; SUPPORT; SCHEME;
D O I
10.1016/j.heliyon.2024.e28117
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the swift advancement of cloud computing and the Internet of Things (IoT), to address the issue of massive data storage, IoT devices opt to offload their data to cloud servers so as to alleviate the pressure of resident storage and computation. However, storing local data in an outsourced database is bound to face the danger of tampering. To handle the above problem, a verifiable database (VDB), which was initially suggested in 2011, has garnered sustained interest from researchers. The concept of VDB enables resource-limited clients to securely outsource extremely large databases to untrusted servers, where users can retrieve database records and modify them by allocating new values, and any attempts at tampering will be detected. This paper provides a systematic summary of VDB. First, a definition of VDB is given, along with correctness and security proofs. And the VDB based on commitment constructions is introduced separately, mainly divided into vector commitments and polynomial commitments. Then VDB schemes based on delegated polynomial functions are introduced, mainly in combination with Merkle trees and forward-secure symmetric searchable encryption. We then classify the current VDB schemes relying on four different assumptions. Besides, we classify the established VDB schemes built upon two different groups. Finally, we introduce the applications and future development of VDB. To our knowledge, this is the first VDB review paper to date.
引用
收藏
页数:21
相关论文
共 50 条
  • [41] Publicly Verifiable Boolean Query Over Outsourced Encrypted Data
    Jiang, Shunrong
    Zhu, Xiaoyan
    Guo, Linke
    Liu, Jianqing
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2019, 7 (03) : 799 - 813
  • [42] Integrity coded databases- protecting data integrity for outsourced databases
    Yeh, Jyh-haw
    Arifin, Md Mashrur
    Shen, Ning
    Karki, Ujwal
    Xie, Yi
    Nanjundarao, Archana
    [J]. COMPUTERS & SECURITY, 2024, 136
  • [43] Data Security and Privacy for Outsourced Data in the Cloud
    Sahin, Cetin
    El Abbadi, Amr
    [J]. 2018 IEEE 34TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2018, : 1731 - 1734
  • [44] SURVEY ON SECURITY OF IoT
    Sri, S. Vinitha
    Mohanapriya, A.
    [J]. 2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 447 - +
  • [45] Key Management for Outsourced Data Security
    PEI Bei
    CHEN Changsong
    WAN Changsheng
    [J]. Wuhan University Journal of Natural Sciences, 2014, 19 (05) : 449 - 454
  • [46] Verifiable database supporting keyword searches with forward security
    Miao, Meixia
    Wang, Yunling
    Wang, Jianfeng
    Huang, Xinyi
    [J]. COMPUTER STANDARDS & INTERFACES, 2021, 77
  • [47] IPOD2: an irrecoverable and verifiable deletion scheme for outsourced data
    Zhang, Xiaolei
    Chen, Zhaoyu
    Zhang, Xin
    Shen, Qingni
    Wu, Zhonghai
    [J]. COMPUTER JOURNAL, 2024, : 2877 - 2889
  • [48] Verifiable Outsourced Decryption of Encrypted Data From Heterogeneous Trust Networks
    Hahn, Changhee
    Kim, Jongkil
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (22): : 22559 - 22570
  • [49] Constructing Private Indexes on Encrypted Data for Outsourced Databases
    Tang, Yi
    Zhang, Ji
    Zhang, Xiaolei
    [J]. FUTURE DATA AND SECURITY ENGINEERING, FDSE 2014, 2014, 8860 : 71 - 85
  • [50] Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources
    Song, Wei
    Wang, Bing
    Wang, Qian
    Shi, Chengliang
    Lou, Wenjing
    Peng, Zhiyong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (10) : 2334 - 2347