RDAS: A symmetric key scheme for authenticated query processing in outsourced databases

N/ACitations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security of outsourced databases is an important problem of current practical interest. In this paper we address the problem of authenticated query processing in outsourced databases. We describe the syntax of a generic scheme for authenticated query processing called RDAS, and provide security definitions for RDAS in line with concrete provable security. Then, we propose a new scheme called RDAS1 which enables a client to ensure both correctness and completeness of the query results obtained from a server. Our solution involves use of bitmap indices and message authentication codes in a novel manner. We prove that RDAS1 is secure relative to our security definition. Finally, we discuss a concrete improvement over RDAS1 (which we call RDAS2) and provide performance data for both RDAS1 and RDAS2 on a real data base. © 2013 Springer-Verlag.

Cite

CITATION STYLE

APA

Rodríguez-Henríquez, L. M., & Chakraborty, D. (2013). RDAS: A symmetric key scheme for authenticated query processing in outsourced databases. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8203 LNCS, pp. 115–130). https://doi.org/10.1007/978-3-642-41098-7_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free