Tell me the truth: Practically public authentication for outsourced databases with multi-user modification

被引:11
|
作者
Song, Wei [1 ,2 ,3 ]
Wang, Bing [3 ]
Wang, Qian [1 ]
Peng, Zhiyong [1 ,2 ]
Lou, Wenjing [3 ]
机构
[1] Wuhan Univ, State Key Lab Software Engn, Wuhan, Peoples R China
[2] Wuhan Univ, Sch Comp Sci, Wuhan, Peoples R China
[3] Virginia Polytech Inst & State Univ, Dept Comp Sci, Blacksburg, VA 24061 USA
基金
中国国家自然科学基金;
关键词
Outsourced database; Public authentication; Homomorphic verifiable tags; QUERY;
D O I
10.1016/j.ins.2016.07.031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advent of cloud computing, outsourcing databases to remote cloud servers provide the elastic, flexible and affordable data management services for the Internet users. The cloud users can create, store, access and update the remote outsourced databases just as they are using the database system locally. However, unlike storing data in a fully controlled local database, storing data in a remote cloud server raises data privacy and security concerns, i.e., the correctness and completeness of the query results. Although some solutions have been proposed to address this problem, they do not scale well when multiple users update the remote outsourced database for two major reasons. First, the existing schemes mainly use the authenticated data structure (ADS) to provide the verification service which incurs expensive computation cost, especially when modifications are made to the database. Second, the data owner has to remain online all the time to participate in generating signatures for the modified data. Consider the fact that the outsourced databases involve lots of heavy multi-user modification operations, the existing solutions are not practical from the efficiency perspective. To address the above concerns, in this paper, we first propose a novel and efficient signature scheme which features additive homomorphic operations. On top of that, we further propose a new and practical mechanism for correctness and completeness verification with the support of multi-user modifications and without requiring an always-online data owner. Finally, we prove the security of our scheme under the well-known Computational Diffie-Hellman assumption and conduct extensive experiments to evaluate the performance of our scheme. The experimental results show that our scheme outperforms the existing solutions. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:221 / 237
页数:17
相关论文
共 50 条
  • [1] Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification
    Wang, Xu An
    Weng, Jian
    Ma, Jianfeng
    Yang, Xiaoyuan
    [J]. INFORMATION SCIENCES, 2019, 488 : 13 - 18
  • [2] Efficient Public Integrity Checking for Cloud Data Sharing with Multi-User Modification
    Yuan, Jiawei
    Yu, Shucheng
    [J]. 2014 PROCEEDINGS IEEE INFOCOM, 2014, : 2121 - 2129
  • [3] Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits
    Liu, Xueqiao
    Yang, Guomin
    Susilo, Willy
    He, Kai
    Deng, Robert H.
    Weng, Jian
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4929 - 4943
  • [4] Toward Multi-User Authentication Using WiFi Signals
    Kong, Hao
    Lu, Li
    Yu, Jiadi
    Chen, Yingying
    Xu, Xiangyu
    Lyu, Feng
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2023, 31 (05) : 2117 - 2132
  • [5] Anonymous Searchable Encryption Scheme for Multi-User Databases
    Varadharajan, Vijayaraghavan
    Mani, Raghubansh
    Nallusamy, Rajarathnam
    [J]. PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2013), 2013, : 225 - 232
  • [6] Keystroke dynamics in password authentication for multi-user account
    Department of Computer Science and Technology, Tongji University, Shanghai, China
    不详
    [J]. J. Comput. Inf. Syst., 1 (321-331): : 321 - 331
  • [7] Multi-user broadcast authentication in wireless sensor networks
    Ren, Kui
    Lou, Wenjing
    Zhang, Yanchao
    [J]. 2007 4TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD-HOC COMMUNICATIONS AND NETWORKS, VOLS 1 AND 2, 2007, : 223 - +
  • [8] Certificateless Authentication Searchable Encryption Scheme for Multi-user
    Zhang Yulei
    Wen Long
    Wang Haohao
    Zhang Yongjie
    Wang Caifen
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (05) : 1094 - 1101
  • [9] Multi-User Physical-Layer Authentication and Classification
    Xie, Ning
    Sha, Mingrui
    Hu, Tianxing
    Tan, Haijun
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22 (09) : 6171 - 6184
  • [10] Multi-User Broadcast Authentication in Wireless Sensor Networks
    Ren, Kui
    Yu, Shucheng
    Lou, Wenjing
    Zhang, Yanchao
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (08) : 4554 - 4564