File(s) under permanent embargo
A hierarchical VDB scheme with scalable verification and tampered record localization
conference contributionposted on 2017-01-01, 00:00 authored by Z Zhang, X Chen, J Li, J Ma, Yang Xiang
The notion of verifiable database (VDB) plays an important role in secure outsourcing of data storage, which allows a client, typically a resource-limited one, to outsource a large-scale database to an untrusted server and make retrieval and update queries. For each query request, the server responds with a query result and a proof that is used to verify the result. Many VDB schemes have been proposed to provide the verification of outsourced databases, however, the existing VDB schemes are impracticable because of their inefficiency of initialization and query, unacceptable public key size and inability of tampered record localization scope. Therefore, in this paper, we present a new VDB scheme based on the Vector Commitments Tree (VCT) which is a new extension of the traditional Vector Commitments (VC). Our VDB scheme is superior to exiting schemes in at least two aspects: one is that the efficiency of initialization and query is greatly improved, and the other is that hierarchical scalable verification and tampered record localization are realized.
EventIEEE Computer Society. Conference (2017 : Guangzhou, China)
SeriesIEEE Computer Society Conference
Pagination1212 - 1216
PublisherInstitute of Electrical and Electronics Engineers
Place of publicationPiscataway, N.J.
Publication classificationE1.1 Full written paper - refereed
Copyright notice2017, IEEE
Title of proceedingsISPA/IUCC 2017 : Proceedings of the 15th IEEE International Symposium on Parallel and Distributed Processing with Applications and 16th IEEE International Conference on Ubiquitous Computing and Communications
CategoriesNo categories selected
Verifiable DatabasesVector Commitments TreeOutsourced StorageCloud ComputingTampered Record LocalizationScience & TechnologyTechnologyComputer Science, Hardware & ArchitectureComputer Science, Information SystemsComputer Science, Interdisciplinary ApplicationsTelecommunicationsComputer ScienceCOMPUTATION