A new query integrity verification method for encrypted data in database outsourcing

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In database outsourcing, two issues of data security emerge: data confidentiality and data integrity. Existing data transformation schemes were widely studied for preserving data confidentiality, but they are vulnerable to data leakage problem because they do not consider data distribution when encrypting data. Meanwhile, query authentication schemes verifying data integrity, suffer from transmission overhead for verification data. In this paper, we propose a privacy-aware query authentication scheme which guarantees the data confidentiality and the query result integrity of sensitive data. To solve the original data leakage problem, we propose a bitmap-based data transformation scheme with anchor selection based on data distribution. Also, we devise a query result authentication index that stores an encrypted signature for each anchor so that it can reduce the amount of auditing data. Through performance evaluation, we show that our scheme outperforms the state-of-the-art method in terms of query processing time and verification overhead.

Cite

CITATION STYLE

APA

Jang, M., Yoon, M., Song, Y., & Chang, J. W. (2015). A new query integrity verification method for encrypted data in database outsourcing. In Lecture Notes in Electrical Engineering (Vol. 352, pp. 67–72). Springer Verlag. https://doi.org/10.1007/978-3-662-47487-7_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free