scispace - formally typeset
Proceedings ArticleDOI

Verifiable Search for Dynamic Outsourced Database in Cloud Computing

TLDR
This paper presents a new verifiable search scheme for outsourced database supporting data update operation without any pre-computation, and shows that this work cannot be effectively adoptable in dynamic database scenario.
Abstract
The notion of database outsourcing enables the data owner to delegate the database management to a cloud service provider (CSP) that provides various services to users of the database. It is inevitably to bring in new security challenges such as data privacy and query integrity. Although the issue of data privacy can be solved by database encryption techniques, query integrity is still an important challenge in database outsourcing scenario. Recently, some researchers present a verifiable auditing scheme, which can simultaneously achieve the correctness and completeness of search results even if the CSP intentionally returns an empty set. However, it requires the data owner to count the number of each identical item before outsourcing the database, which seems that this work cannot be effectively adoptable in dynamic database scenario. In this paper, we present a new verifiable search scheme for outsourced database supporting data update operation without any pre-computation.

read more

Citations
More filters
Journal ArticleDOI

Towards achieving flexible and verifiable search for outsourced database in cloud computing

TL;DR: A novel verifiable search scheme for outsourced database based on invertible Bloom filter (IBF), which can achieve verifiability of search result without the process of pre-counting is proposed.
Journal ArticleDOI

Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing

TL;DR: A novel verifiable fuzzy keyword search scheme over encrypted cloud data is proposed and an authentication label is generated for each fuzzy keyword to verify the authenticity of the returned ciphertexts.
Patent

A database verification system and method supporting complete update operation

TL;DR: In this paper, an incremental reversible Bloom filter with commitments is proposed and the problem in rapid data reverse indexing in a limited range is solved; on such a basis, the database verification system and method supporting complete update operation (insertion, deletion and replacement) are proposed.
Patent

Ciphertext search result verification method and system therefor

TL;DR: In this article, a ciphertext search result verification method and a system therefor is presented. But the method is applicable to the field of search search and is not suitable for mobile medical networks.
Patent

Multiple users-based outsourcing database audit method

Gao Ziyuan, +1 more
TL;DR: In this paper, a multiple users-based outsourcing database audit method is proposed to solve the problems of low signature verification efficiency and complex decryption in the prior art, which can be applied to safe data outsourcing in a cloud calculation environment.
References
More filters
Proceedings ArticleDOI

Providing database as a service

TL;DR: A novel paradigm for data management in which a third party service provider hosts "database as a service", providing its customers with seamless mechanisms to create, store, and access their databases at the host site is explored.
Journal ArticleDOI

New Algorithms for Secure Outsourcing of Modular Exponentiations

TL;DR: This paper proposes a new secure outsourcing algorithm for (variable-exponent, variable-base) exponentiation modulo a prime in the two untrusted program model and proposes the first efficient outsource-secure algorithm for simultaneous modular exponentiations.
Proceedings ArticleDOI

Verifying completeness of relational query results in data publishing

TL;DR: This paper introduces a scheme for users to verify that their query results are complete and authentic, and supports range selection on key and non-key attributes and join queries on relational databases.
Book ChapterDOI

Authentic Third-party Data Publication

TL;DR: This paper focuses on integrity critical databases, such as financial data used in high-value decisions, which are frequently published over the Internet and must satisfy the integrity, authenticity, and non-repudiation requirements of clients.
Book ChapterDOI

Secure outsourcing of scientific computations

TL;DR: No single disguise technique is suitable for a broad range of scientific computations but there is an array of disguise techniques available so that almost any scientific computation could be disguised at a reasonable cost and with very high levels of security.
Related Papers (5)