A Privacy-aware Query Authentication Index for Encrypted Database in Cloud

被引:0
|
作者
Jang, Miyoung [1 ]
Jo, Ara [1 ]
Chang, Jae-Woo [1 ]
机构
[1] Chonbuk Natl Univ, Dept Comp Engn, Jeonju 561756, South Korea
关键词
Database outsourcing; Encrypted database; Data authentication index; Query result integrity;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing has been spotlighted as a new paradigm of database management system. However, cloud service provider might be untrusted so that two issues of data security, including data confidentiality and query result integrity, become major concerns for users. Existing bucket-based data authentication methods have problems of data disclosure and transmission overhead, due to the unsophisticated data grouping strategy. In this paper, we propose a privacy-aware query authentication index which guarantees data confidentiality and query result integrity for users. We privately partition a spatial database into small groups by using periodic function and generate a signature of each group. The group signature is used to check the correctness and completeness of outsourced data when answering a range query to users. Through performance evaluation, it is shown that proposed method outperforms the existing method in terms of range query processing time up to 3 times.
引用
收藏
页码:126 / 131
页数:6
相关论文
共 50 条
  • [1] A Privacy-aware Query Authentication Index for Database Outsourcing
    Jang, Miyoung
    Yoon, Min
    Chang, Jae-Woo
    [J]. 2014 INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP), 2014, : 72 - 76
  • [2] A Privacy-Aware and User-Centric Approach for Query Processing in Cloud
    Samanthula, Bharath K.
    Liporace, James
    Issiov, Martin
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2018, : 54 - 59
  • [3] Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
    He, Debiao
    Kumar, Neeraj
    Khan, Muhammad Khurram
    Wang, Lina
    Shen, Jian
    [J]. IEEE SYSTEMS JOURNAL, 2018, 12 (02): : 1621 - 1631
  • [4] A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
    Tsai, Jia-Lun
    Lo, Nai-Wei
    [J]. IEEE SYSTEMS JOURNAL, 2015, 9 (03): : 805 - 815
  • [5] Privacy-Aware Authentication in the Internet of Things
    Gross, Hannes
    Hoelbl, Marko
    Slamanig, Daniel
    Spreitzer, Raphael
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 32 - 39
  • [6] An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
    Xiong, Ling
    Peng, Daiyuan
    Peng, Tu
    Liang, Hongbin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (12): : 6169 - 6187
  • [7] Cuckoo-Filter Based Privacy-Aware Search over Encrypted Cloud Data
    Xue, Qinghan
    Chuah, Mooi Choo
    [J]. 2015 11TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN), 2015, : 60 - 68
  • [8] Traceable Anonymous Authentication and Key Exchange Protocol for Privacy-Aware Cloud Environments
    Lin, Han-Yu
    [J]. IEEE Systems Journal, 2019, 13 (02) : 1608 - 1617
  • [9] Traceable Anonymous Authentication and Key Fxchange Protocol for Privacy-Aware Cloud Environments
    Lin, Han-Yu
    [J]. IEEE SYSTEMS JOURNAL, 2019, 13 (02): : 1608 - 1617
  • [10] On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
    Jiang, Qi
    Ma, Jianfeng
    Wei, Fushan
    [J]. IEEE SYSTEMS JOURNAL, 2018, 12 (02): : 2039 - 2042