Encrypted database integrity in database service provider model

被引:0
|
作者
Hacigümüs, H [1 ]
Iyer, B [1 ]
Mehrotra, S [1 ]
机构
[1] Univ Calif Irvine, Dept Informat & Comp Sci, Irvine, CA 92697 USA
关键词
database; security; privacy; integrity; authentication; encryption; cryptography; e-service; service provider model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the database service provider model, a service provider hosts client's data and allows access to data via a database language such as SQL. Database service provider model offers considerable benefits to organizations with data management needs. Yet, the model introduces many significant challenges, in particular that of data privacy and security. Ensuring the integrity of the database, which is hosted by a service provider, is a critical and challenging problem in this context. We propose an encrypted database integrity scheme, which allows the owner of the data to ensure the integrity of the database hosted at the service provider site, in addition to security of the stored data against malicious attacks.
引用
收藏
页码:165 / 174
页数:10
相关论文
共 50 条
  • [1] Ensuring the integrity of encrypted databases in the database-as-a-service model
    Hacigümüs, H
    Iyer, B
    Mehrotra, S
    [J]. DATA AND APPLICATIONS SECURITY XVII: STATUS AND PROSPECTS, 2004, 142 : 61 - 74
  • [2] A Survey on Querying Encrypted Data for Database as a Service
    Ravan, Rama Roshan
    Idris, Norbik Bashah
    Mehrabani, Zahra
    [J]. 2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2013, : 14 - 18
  • [3] A Retrieve Model of WESU for Encrypted XML Database
    Shao Nan
    Lu Xuanmin
    Wu Heng
    [J]. 2010 2ND INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS PROCEEDINGS (DBTA), 2010,
  • [4] A New Query Integrity Verification Method for Encrypted Data in Database Outsourcing
    Jang, Miyoung
    Yoon, Min
    Song, Youngho
    Chang, Jae-Woo
    [J]. Advanced Multimedia and Ubiquitous Engineering: Future Information Technology, 2015, 352 : 67 - 72
  • [5] Executing SQL queries over encrypted character strings in the Database-As-Service model
    Wu, ZongDa
    Xu, GuanDong
    Yu, Zong
    Yi, Xun
    Chen, EnHong
    Zhang, YanChun
    [J]. KNOWLEDGE-BASED SYSTEMS, 2012, 35 : 332 - 348
  • [6] PARALLEL PROCESSING OF ENCRYPTED XML DOCUMENTS IN DATABASE AS A SERVICE CONCEPT
    Unay, Ozan
    Gundem, Taflan Imre
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2010, 39 (04): : 301 - 309
  • [7] DATABASE INTEGRITY
    DAVENPORT, RA
    [J]. COMPUTER JOURNAL, 1976, 19 (02): : 110 - 116
  • [8] Information Processing for Encrypted Database
    Sun, Ruxia
    Yin, Chunyong
    [J]. ACC 2009: ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2009, : 252 - 255
  • [9] A security analysis for encrypted database
    Mingsheng, Zhang
    Chunyong, Yin
    [J]. 2007 International Symposium on Computer Science & Technology, Proceedings, 2007, : 987 - 990
  • [10] Nonlinear order preserving index for encrypted database query in service cloud environments
    Liu, Dongxi
    Wang, Shenlu
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2013, 25 (13): : 1967 - 1984