Tell me the truth: Practically public authentication for outsourced databases with multi-user modification

被引:11
|
作者
Song, Wei [1 ,2 ,3 ]
Wang, Bing [3 ]
Wang, Qian [1 ]
Peng, Zhiyong [1 ,2 ]
Lou, Wenjing [3 ]
机构
[1] Wuhan Univ, State Key Lab Software Engn, Wuhan, Peoples R China
[2] Wuhan Univ, Sch Comp Sci, Wuhan, Peoples R China
[3] Virginia Polytech Inst & State Univ, Dept Comp Sci, Blacksburg, VA 24061 USA
基金
中国国家自然科学基金;
关键词
Outsourced database; Public authentication; Homomorphic verifiable tags; QUERY;
D O I
10.1016/j.ins.2016.07.031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advent of cloud computing, outsourcing databases to remote cloud servers provide the elastic, flexible and affordable data management services for the Internet users. The cloud users can create, store, access and update the remote outsourced databases just as they are using the database system locally. However, unlike storing data in a fully controlled local database, storing data in a remote cloud server raises data privacy and security concerns, i.e., the correctness and completeness of the query results. Although some solutions have been proposed to address this problem, they do not scale well when multiple users update the remote outsourced database for two major reasons. First, the existing schemes mainly use the authenticated data structure (ADS) to provide the verification service which incurs expensive computation cost, especially when modifications are made to the database. Second, the data owner has to remain online all the time to participate in generating signatures for the modified data. Consider the fact that the outsourced databases involve lots of heavy multi-user modification operations, the existing solutions are not practical from the efficiency perspective. To address the above concerns, in this paper, we first propose a novel and efficient signature scheme which features additive homomorphic operations. On top of that, we further propose a new and practical mechanism for correctness and completeness verification with the support of multi-user modifications and without requiring an always-online data owner. Finally, we prove the security of our scheme under the well-known Computational Diffie-Hellman assumption and conduct extensive experiments to evaluate the performance of our scheme. The experimental results show that our scheme outperforms the existing solutions. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:221 / 237
页数:17
相关论文
共 50 条
  • [41] Multi-User Physical Layer Authentication Based on CSI Using ResNet in Mobile IIoT
    Jing, Tao
    Huang, Hongyan
    Gao, Qinghe
    Wu, Yue
    Huo, Yan
    Wang, Yawei
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 1896 - 1907
  • [42] IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
    Cao, Xuefei
    Kou, Weidong
    Dang, Lanjun
    Zhao, Bin
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (04) : 659 - 667
  • [43] A Multi-user DoS-containment Broadcast Authentication Scheme for Wireless Sensor Networks
    Gan, Xian
    Li, Qiaoliang
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, VOL 1, PROCEEDINGS, 2009, : 472 - 475
  • [44] Energy Efficient and Secure Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks
    Maidhili, Siri R.
    Karthik, G. M.
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2018,
  • [45] Public-key cryptography and password protocols: The multi-user case
    Boyarsky, MK
    [J]. 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 1999, : 63 - 72
  • [46] Design Considerations for Application Selection and Control in Multi-user Public Displays
    Taivan, Constantin
    Jose, Rui
    Silva, Bruno
    Elhart, Ivan
    Cardoso, Jorge
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2013, 19 (17) : 2526 - 2542
  • [47] Public Key Encryption with Delegated Equality Test in a Multi-User Setting
    Ma, Sha
    Zhang, Mingwu
    Huang, Qiong
    Yang, Bo
    [J]. COMPUTER JOURNAL, 2015, 58 (04): : 986 - 1002
  • [48] Pay-Per-Proof: Decentralized Outsourced Multi-User PoR for Cloud Storage Payment Using Blockchain
    Cui, Hui
    Wan, Zhiguo
    Zhaolu, Tianyu
    Wang, Huaqun
    Miyaji, Atsuko
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2024, 12 (01) : 130 - 144
  • [49] Multi-user broadcast authentication scheme for wireless sensor network based on elliptic curve cryptography
    Kasyoka, Philemon
    Kimwele, Michael
    Angolo, Shem Mbandu
    [J]. ENGINEERING REPORTS, 2020, 2 (07)
  • [50] Multi-User Authentication Using Biometric Sensor Using Parallel Processing Algorithm For Attendance Monitoring
    Ramalingam, M.
    Vinothkumar, S.
    Varadhaganapathy, S.
    Subha, S.
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 84 - 89