Verifiable Auditing Protocol with Proxy Re-Encryption for Outsourced Databases in Cloud
- 19 March 2018
- journal article
- computer science
- Published by EDP Sciences in Wuhan University Journal of Natural Sciences
- Vol. 23 (2), 120-128
- https://doi.org/10.1007/s11859-018-1302-5
Abstract
As a new computing paradigm, outsourcing computing provides inexpensive, on-demand, convenient storage and computing services for cloud clients. For the security of outsourcing databases to the cloud, it is important to allow the user to verify the query results returned by the cloud server. So far, tremendous efforts have been carried out to study secure outsourcing computing. The existing scheme supports that the user can detect the correctness and completeness of the query results even if the cloud server returns an empty set. However, since the data owner performs the database encryption operations and uploads the encrypted database to the cloud server, they require the user to request the data owner to decrypt the query results. In this paper, we propose a new scheme, which can accurately verify the search results. Meanwhile, the users can decrypt the query results independently. Furthermore, the proposed scheme supports a large number of data owners to upload their encrypted database to the cloud server, and it can efficiently verify the query results. Besides, we can prove that our proposed solution can achieve the desired security properties.Keywords
This publication has 15 references indexed in Scilit:
- Query Racing: Fast Completeness Certification of Query ResultsLecture Notes in Computer Science, 2010
- Scalable verification for outsourced dynamic databasesProceedings of the VLDB Endowment, 2009
- Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utilityFuture Generation Computer Systems, 2009
- Partially materialized digest scheme: an efficient verification method for outsourced databasesThe VLDB Journal, 2008
- Authentication and integrity in outsourced databasesACM Transactions on Storage, 2006
- Authentication of Outsourced Databases Using Signature Aggregation and ChainingLecture Notes in Computer Science, 2006
- Verifying completeness of relational query results in data publishingPublished by Association for Computing Machinery (ACM) ,2005
- Verified Query Results from Hybrid Authentication TreesLecture Notes in Computer Science, 2005
- Selective and authentic third-party distribution of XML documentsIEEE Transactions on Knowledge and Data Engineering, 2004
- Authentic data publication over the Internet1Journal of Computer Security, 2003