Verifiable algorithm for outsourced database with updating

被引:0
|
作者
Zhen Guo
Hui Li
Chunjie Cao
Zhengxi Wei
机构
[1] Xidian University,School of Network and Information Security
[2] Hainan University,College of Information Science & Technology
[3] State Key Laboratory of Marine Resource Utilization in the South China Sea,School of Computer Science
[4] Sichuan University of Science and Engineering,undefined
[5] Guangxi Key Laboratory of Cryptography and Information Security,undefined
来源
Cluster Computing | 2019年 / 22卷
关键词
Verification; Update; Outsourced database;
D O I
暂无
中图分类号
学科分类号
摘要
In cloud computing, by using the outsourcing technique, the clients can perform the complex tasks easily with the help of cloud computing. However, cloud service providers are usually untrusted, thus, the clients may lose the controllability of outsourced data. Therefore, it is important to guarantee the security of the outsourced data. In this paper, we focus on the security of outsourced database. A verification scheme for out-sourced database is proposed. In this scheme, the out-sourced data is disguised, and the cloud server cannot get the original data. If the cloud server returns dummy data (changed data, real data but not the required one), it will be detected by the clients easily. Furthermore, the clients can update the outsourced data, and a new proof will be generated to ensure the correctness of the data. The efficiency of data update is very high, and the computational cost of the client is low. This scheme is suitable for the resource-constrained devices, such as wearable devices.
引用
收藏
页码:5185 / 5193
页数:8
相关论文
共 50 条
  • [31] Verifiable outsourced computation over encrypted data
    Yu, Xixun
    Yan, Zheng
    Zhang, Rui
    [J]. INFORMATION SCIENCES, 2019, 479 : 372 - 385
  • [32] Identity-Based Encryption with Verifiable Outsourced Revocation
    Ren, Yanli
    Ding, Ning
    Zhang, Xinpeng
    Lu, Haining
    Gu, Dawu
    [J]. COMPUTER JOURNAL, 2016, 59 (11): : 1659 - 1668
  • [33] SEVCOD: secure and efficient verifiable computation on outsourced data
    Chakraborty, Partha Sarathi
    Gavhane, Omkar Santosh
    Tripathy, Somanath
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (04): : 4725 - 4739
  • [34] New verifiable outsourced computation scheme for an arbitrary function
    Xiang, Can
    Tang, Chunming
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2016, 7 (03) : 190 - 199
  • [35] Verifiable outsourced attribute-based signature scheme
    Yanli Ren
    Tiejin Jiang
    [J]. Multimedia Tools and Applications, 2018, 77 : 18105 - 18115
  • [36] An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption
    Li, Zhidan
    Li, Wenmin
    Jin, Zhengping
    Zhang, Hua
    Wen, Qiaoyan
    [J]. IEEE ACCESS, 2019, 7 : 29023 - 29037
  • [37] Efficient RAM and Control Flow in Verifiable Outsourced Computation
    Wahby, Riad S.
    Setty, Srinath
    Ren, Zuocheng
    Blumberg, Andrew J.
    Walfish, Michael
    [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [38] Verifiable outsourced attribute-based signature scheme
    Ren, Yanli
    Jiang, Tiejin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 18105 - 18115
  • [39] Outsourced Privately Verifiable Proofs of Retrievability via Blockchain
    Cui, Hui
    Wan, Zhiguo
    Gao, Rui
    Wang, Huaqun
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 1501 - 1514
  • [40] Publicly Verifiable Conjunctive Keyword Search in Outsourced Databases
    Azraoui, Monir
    Elkhiyaoui, Kaoutar
    Onen, Melek
    Molva, Refik
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 619 - 627