RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases

被引:0
|
作者
Maria Rodriguez-Henriquez, Lil [1 ]
Chakraborty, Debrup [1 ]
机构
[1] IPN, CINVESTAV, Dept Computac, Mexico City 07360, DF, Mexico
来源
关键词
Database security; query authentication; bitmap index; MACs; EFFICIENT VERIFICATION;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security of outsourced databases is an important problem of current practical interest. In this paper we address the problem of authenticated query processing in outsourced databases. We describe the syntax of a generic scheme for authenticated query processing called RDAS, and provide security definitions for RDAS in line with concrete provable security. Then, we propose a new scheme called RDAS1 which enables a client to ensure both correctness and completeness of the query results obtained from a server. Our solution involves use of bitmap indices and message authentication codes in a novel manner. We prove that RDAS1 is secure relative to our security definition. Finally, we discuss a concrete improvement over RDAS1 (which we call RDAS2) and provide performance data for both RDAS1 and RDAS2 on a real data base.
引用
收藏
页码:115 / 130
页数:16
相关论文
共 50 条
  • [11] Authenticated Outlier Mining for Outsourced Databases
    Dong, Boxiang
    Wang, Hui
    Monreale, Anna
    Pedreschi, Dino
    Giannotti, Fosca
    Guo, Wenge
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (02) : 222 - 235
  • [12] A Range Key Query Scheme for Multidimensional Databases
    Hasan, K. M. Azharul
    Tsuji, Tatsuo
    Higuchi, Ken
    [J]. PROCEEDINGS OF ICECE 2008, VOLS 1 AND 2, 2008, : 958 - 963
  • [13] Efficient Privacy-Preserving Query Processing on Outsourced Geographic Databases
    Zhao, Li
    Liu, Qin
    Huang, Hejiao
    Jia, Xiaohua
    [J]. 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [14] Query Access Assurance in Outsourced Databases
    Le, Wangchao
    Li, Feifei
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2012, 5 (02) : 178 - 191
  • [15] An efficient key management scheme for user access control in outsourced databases
    Hong, Seungtae
    Kim, Hyeong-Il
    Chang, Jae-Woo
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2017, 20 (03): : 467 - 490
  • [16] An efficient key management scheme for user access control in outsourced databases
    Seungtae Hong
    Hyeong-Il Kim
    Jae-Woo Chang
    [J]. World Wide Web, 2017, 20 : 467 - 490
  • [17] ARM: Authenticated Approximate Record Matching for Outsourced Databases
    Dong, Boxiang
    Wang, Wendy
    [J]. PROCEEDINGS OF 2016 IEEE 17TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI), 2016, : 591 - 600
  • [18] Authenticated Subgraph Similarity Search in Outsourced Graph Databases
    Peng, Yun
    Fan, Zhe
    Choi, Byron
    Xu, Jianliang
    Bhowmick, Sourav S.
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2015, 27 (07) : 1838 - 1860
  • [19] ConcurDB: Concurrent Query Authentication for Outsourced Databases
    Bajaj, Sumeet
    Chakraborti, Anrin
    Sion, Radu
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2021, 33 (04) : 1401 - 1412
  • [20] A spatial transformation scheme supporting data privacy and query integrity for security of outsourced databases
    Kim, Hyeong-Il
    Hossain, Al-Amin
    Chang, Jae-Woo
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (10) : 1498 - 1509