You are not logged in.

Verifiable auditing for outsourced database in cloud computing

Wang, Jianfeng, Chen, Xiaofeng, Huang, Xinyi, You, Ilsun and Xiang, Yang 2015, Verifiable auditing for outsourced database in cloud computing, IEEE transactions on computers, vol. 64, no. 11, pp. 3293-3303, doi: 10.1109/TC.2015.2401036.

Attached Files
Name Description MIMEType Size Downloads

Title Verifiable auditing for outsourced database in cloud computing
Author(s) Wang, Jianfeng
Chen, Xiaofeng
Huang, Xinyi
You, Ilsun
Xiang, YangORCID iD for Xiang, Yang orcid.org/0000-0001-5252-0831
Journal name IEEE transactions on computers
Volume number 64
Issue number 11
Start page 3293
End page 3303
Total pages 11
Publisher IEEE
Place of publication Piscataway, N.J.
Publication date 2015-11-01
ISSN 0018-9340
Keyword(s) Science & Technology
Technology
Computer Science, Hardware & Architecture
Engineering, Electrical & Electronic
Computer Science
Engineering
Integrity auditing
database encryption
outsourcing computation
cloud computing
COMPUTATIONS
VERIFICATION
Summary The notion of database outsourcing enables the data owner to delegate the database management to a cloud service provider (CSP) that provides various database services to different users. Recently, plenty of research work has been done on the primitive of outsourced database. However, it seems that no existing solutions can perfectly support the properties of both correctness and completeness for the query results, especially in the case when the dishonest CSP intentionally returns an empty set for the query request of the user. In this paper, we propose a new verifiable auditing scheme for outsourced database, which can simultaneously achieve the correctness and completeness of search results even if the dishonest CSP purposely returns an empty set. Furthermore, we can prove that our construction can achieve the desired security properties even in the encrypted outsourced database. Besides, the proposed scheme can be extended to support the dynamic database setting by incorporating the notion of verifiable database with updates.
Language eng
DOI 10.1109/TC.2015.2401036
Field of Research 080303 Computer System Security
080501 Distributed and Grid Systems
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category C1 Refereed article in a scholarly journal
ERA Research output type C Journal article
Copyright notice ©2015, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30082896

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 15 times in TR Web of Science
Scopus Citation Count Cited 18 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 29 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Mon, 18 Apr 2016, 12:29:06 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.