File(s) under permanent embargo
A hierarchical VDB scheme with scalable verification and tampered record localization
conference contribution
posted on 2017-01-01, 00:00 authored by Z Zhang, X Chen, J Li, J Ma, Yang XiangThe notion of verifiable database (VDB) plays an important role in secure outsourcing of data storage, which allows a client, typically a resource-limited one, to outsource a large-scale database to an untrusted server and make retrieval and update queries. For each query request, the server responds with a query result and a proof that is used to verify the result. Many VDB schemes have been proposed to provide the verification of outsourced databases, however, the existing VDB schemes are impracticable because of their inefficiency of initialization and query, unacceptable public key size and inability of tampered record localization scope. Therefore, in this paper, we present a new VDB scheme based on the Vector Commitments Tree (VCT) which is a new extension of the traditional Vector Commitments (VC). Our VDB scheme is superior to exiting schemes in at least two aspects: one is that the efficiency of initialization and query is greatly improved, and the other is that hierarchical scalable verification and tampered record localization are realized.
History
Event
IEEE Computer Society. Conference (2017 : Guangzhou, China)Series
IEEE Computer Society ConferencePagination
1212 - 1216Publisher
Institute of Electrical and Electronics EngineersLocation
Guangzhou, ChinaPlace of publication
Piscataway, N.J.Publisher DOI
Start date
2017-12-12End date
2017-12-15ISBN-13
9781538637906Language
engPublication classification
E1.1 Full written paper - refereedCopyright notice
2017, IEEEEditor/Contributor(s)
[Unknown]Title of proceedings
ISPA/IUCC 2017 : Proceedings of the 15th IEEE International Symposium on Parallel and Distributed Processing with Applications and 16th IEEE International Conference on Ubiquitous Computing and CommunicationsUsage metrics
Read the peer-reviewed publication
Categories
Keywords
Verifiable DatabasesVector Commitments TreeOutsourced StorageCloud ComputingTampered Record LocalizationScience & TechnologyTechnologyComputer Science, Hardware & ArchitectureComputer Science, Information SystemsComputer Science, Interdisciplinary ApplicationsTelecommunicationsComputer ScienceCOMPUTATION