JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2017, Vol. 52 ›› Issue (9): 41-53.doi: 10.6040/j.issn.1671-9352.0.2017.145

Previous Articles     Next Articles

Verifiable and searchable encryption scheme for outsourced database in cloud computing

HAN Pan-pan1, QIN Jing1,2*   

  1. 1. School of Mathematics, Shandong University, Jinan 250100, Shandong, China;
    2. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
  • Received:2017-04-04 Online:2017-09-20 Published:2017-09-15

Abstract: The security problem of outsourced database in the cloud has become a research hotspot of cloud computing security. This paper proposed two outsourced database models which can achieve the confidentiality of outsourced data, verify the query integrity and protect the search privacy of data searcher effectively. These two models allow to perform exact select of one attribute and its union with projection, support the insert and delete of data. They have higher security properties and more functionality compared with other existing such schemes under the premise of similar computation cost.

Key words: dynamic outsourced database, query integrity, cloud computing, search privacy

CLC Number: 

  • TP309
[1] MELL P, GRANCE T. The NIST definition of cloud computing[M]. Gaithersburg: National Institute of Standards & Technology, 2011.
[2] HACIGUMUS H, IYER B, MEHROTRA S. Providing database as a service[C] // Proceedings of the International Conference on Data Engineering. Los Alamitos: IEEE Computer Society, 2002: 29-38.
[3] SHAIKH F B, HAIDER S. Security threats in cloud computing[C] // Proceedings of 2015 International Conference on Computing, Communication & Automation(ICCCA). New York: IEEE, 2011: 214-219.
[4] CURTMOLAR, GARAYJ, KAMARA S, et al. Searchable symmetric encryption: improved definitions and efficient constructions[EB/OL].(2006-6-26)[2017-2-14]. http://eprint. iacr.org/2006/210.
[5] LI Feifei, HADJIELEFTHERIOU M, KOLLIOS G, et al. Dynamic authenticated index structures for outsourced databases[C] // ACM SIGMOD International Conference on Management of Data. New York: ACM, 2008: 121-132.
[6] HAN Fei, QIN Jing, HU Jiankun. Secure searches in the cloud: a survey[J]. Future Generation Computer Systems, 2016, 62:66-75.
[7] WANG Jianfeng, CHEN Xiaofeng. Efficient and secure storage for outsourced data: a survey[J]. Data Science & Engineering, 2016, 1(3):178-188.
[8] DEVANBU P, GERTZ M, MARTEL C, et al. Authentic data publication over the internet[J]. Journal of Computer Security, 2003, 11(3):291-314.
[9] MA Di, DENG R H, PANG H, et al. Authenticating query results in data publishing[C] // Proceedings of the International Conference on Information and Communications Security. Berlin: Springer-Verlag, 2005: 376-388.
[10] SION R. Query execution assurance for outsourced databases[C] // Proceedings of the 31st International Conference on Very Large Data Bases. [S.l.] : DBLP, 2005: 601-612.
[11] XIE Min, WANG Haixun, YIN Jian, et al. Integrity auditing of outsourced data[C] // Proceedings of the 33rd International Conference on Very Large Data Bases.[S.l.] : DBLP, 2007: 782-793.
[12] MYKLETUN E, NARASIMHA M, TSUDIK G. Authentication and integrity in outsourced databases[J]. ACM Transactions on Storage, 2004, 2(2):107-138.
[13] NARASIMHA M, TSUDIK G. DSAC: integrity for outsourced databases with signature aggregation and chaining[C] // ACM CIKM International Conference on Information and Knowledge Management. New York: ACM Press, 2005: 235-236.
[14] WANG Jianfeng, CHEN Xiaofeng, HUANG Xinyi, et al. Verifiable auditing for outsourced database in cloud computing[J]. IEEE Transactions on Computers, 2015, 64(11):3293-3303.
[15] WANG Jianfeng, CHEN Xiaofeng, LI Jin, et al. Towards achieving flexible and verifiable search for outsourced database in cloud computing[J]. Future Generation Computer Systems, 2017, 67:266-275.
[16] ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C] // ACM Conference on Computer and Communications Security. New York: ACM, 2007: 598-609.
[17] MERKLE R C. A certified digital signature [M] //Advances in Cryptology—CRYPTO’ 89 Proceedings. New York: Springer-Verlag, 1989: 218-238.
[18] BUCHMANN J, DAHMEN E, SCHNEIDER M. Merkle tree traversal revisited[M] // Post-Quantum Cryptography. Berlin: Springer-Verlag, 2008: 63-78.
[19] BURTON H B. Space/Time trade-offs in hash coding with allowable errors[J]. Communications of the ACM, 1970, 13(7):422-426.
[20] EPPSTEIN D, GOODRICH M T. Straggler identification in round-trip data streams via Newton's identities and invertible Bloom filters[J]. IEEE Transactions on Knowledge & Data Engineering, 2010, 23(2):297-306.
[21] FAN Li, CAO Pei, ALMEIDA J, et al. Summary cache: a scalable wide-area Web cache sharing protocol[J]. IEEE/ACM Transactions on Networking, 2000, 8(3):281-293.
[22] EVDOKIMOV S, GUNTHER O. Encryption techniques for secure database outsourcing[C] // Proceedings of the12th European Symposium on Research in Computer Security. Heidelberger: Springer-Verlag Berlin, 2007: 327-342.
[23] CHU Chengkang, TZENG W G. Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries [J]. Journal of Universal Computer Science, 2005, 3(3):172-183.
[1] WANG Xiao-yan, CHEN Xing-shu, WANG Yi-tong, GE Long. Performance measurement and analysis of cloud computing network based on OpenStack [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 30-37.
[2] HUANG Yu-qing, ZHAO Bo, XIAO Yu, TAO Wei. A vTPM-VM live migration scheme based on KVM [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 69-75.
[3] CHEN Guang-rui, CHEN Xing-shu, WANG Yi-tong, GE Long. A software update mechanism for virtual machines in IaaS multi-tenant environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 60-67.
[4] YAO Ke, ZHU Bin-rui, QIN Jing. Verifiable public key searchable encryption protocol based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 11-22.
[5] . An approach of detecting LDoS attacks based on the euclidean distance of available bandwidth in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 92-100.
[6] CAI Hong-yun, TIAN Jun-feng. Research of data privacy protection for cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 83-89.
[7] LUO hai-yan, LÜ Ping, LIU Lin-zhong, YANG Xun. Enterprises trust comprehensive evaluation based on fussy rough AHP in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(08): 111-117.
[8] LIU Yang, QIN Feng-lin, GE Lian-sheng. Measurement study of cloud computing: a survey [J]. J4, 2013, 48(11): 27-35.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!