Query authentication over cloud data from multiple contributors

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As data stored in the cloud may encounter the malicious attack from the cloud service provider (CSP), to ensure data authenticity and integrity, it is necessary to authenticate the query results from CSP. However, most existing authentication methods focus on query over data from a single contributor in the outsourced database. This paper puts forward authentication method for query over data from multiple contributors in the cloud environment. The method can validate data from multiple contributors on only one authentication data structure (ADS) based on Merkle Hash Tree (MHT), which achieves low storage costs and high computational efficiency. Experimental results show that our mechanism can efficiently enable query authentication over cloud data from multiple contributors. © 2014 Springer International Publishing Switzerland.

Cite

CITATION STYLE

APA

Xie, G., Peng, Z., & Song, W. (2014). Query authentication over cloud data from multiple contributors. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8709 LNCS, pp. 469–477). Springer Verlag. https://doi.org/10.1007/978-3-319-11116-2_41

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free