Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-540-77048-0_1guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures

Published: 12 December 2007 Publication History

Abstract

Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in database outsourcing, a client’s database is stored and maintained by an untrusted server. Also, in simple storage systems, clients can store very large amounts of data but at the same time, they want to assure their integrity when they retrieve them. In this paper, we present a model and protocol for two-party authentication of data structures. Namely, a client outsources its data structure and verifies that the answers to the queries have not been tampered with. We provide efficient algorithms to securely outsource a skip list with logarithmic time overhead at the server and client and logarithmic communication cost, thus providing an efficient authentication primitive for outsourced data, both structured (e.g., relational databases) and semi-structured (e.g., XML documents). In our technique, the client stores only a constant amount of space, which is optimal. Our two-party authentication framework can be deployed on top of existing storage applications, thus providing an efficient authentication service. Finally, we present experimental results that demonstrate the practical efficiency and scalability of our scheme.

References

[1]
Anagnostopoulos A., Goodrich M.T., and Tamassia R. Davida G.I. and Frankel Y. Persistent authenticated dictionaries and their applications Information Security 2001 Heidelberg Springer 379-393
[2]
Di Battista, G., Palazzi, B.: Authenticated relational tables and authenticated skip lists. In: Proc. Working Conference on Data and Applications Security (DBSEC), pp. 31–46 (2007)
[3]
Goodrich, M.T., Papamanthou, C., Tamassia, R.: On the cost of persistence and authentication in skip lists. In: Proc. Int. Workshop on Experimental Algorithms (WEA), pp. 94–107 (2007)
[4]
Goodrich M.T., Shin M., Tamassia R., and Winsborough W.H. Nixon P. and Terzis S. Authenticated dictionaries for fresh attribute credentials Trust Management 2003 Heidelberg Springer 332-347
[5]
Goodrich M.T. and Tamassia R. Implementation of an authenticated dictionary with skip lists and commutative hashing Proc. DARPA Information Survivability Conference & Exposition II (DISCEX II) 2001 Los Alamitos IEEE Computer Society Press 68-82
[6]
Goodrich M.T., Tamassia R., and Hasic J. Chan A.H. and Gligor V.D. An efficient dynamic and distributed cryptographic accumulator Information Security 2002 Heidelberg Springer 372-388
[7]
Goodrich M.T., Tamassia R., Triandopoulos N., and Cohen R. Joye M. Authenticated data structures for graph and geometric searching Topics in Cryptology - CT-RSA 2003 2003 Heidelberg Springer 295-313
[8]
Hacigümüş, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proc. Int. Conference on Management of Data (SIGMOD), pp. 216–227 (2002)
[9]
Hacigümüş, H., Mehrotra, S., Iyer, B.: Providing database as a service. In: Proc. Int. Conference on Data Engineering (ICDE), p. 29 (2002)
[10]
Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proc. Int. Conference on Very Large Databases (VLDB), pp. 720–731 (2004)
[11]
Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Proc. of ACM SIGMOD International Conference on Management of Data, pp. 121–132 (2006)
[12]
Martel C., Nuckolls G., Devanbu P., Gertz M., Kwong A., and Stubblebine S.G. A general model for authenticated data structures Algorithmica 2004 39 1 21-41
[13]
Merkle R.C. Brassard G. A certified digital signature Advances in Cryptology - CRYPTO ’89 1990 Heidelberg Springer 218-238
[14]
Miklau G. and Suciu D. Grumbach S., Sui L., and Vianu V. Implementing a tamper-evident database system Advances in Computer Science – ASIAN 2005 2005 Heidelberg Springer 28-48
[15]
Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. In: Proceeding of Network and Distributed System Security (NDSS) (2004)
[16]
Narasimha, M., Tsudik, G.: Authentication of outsourced databases using signature aggregation and chaining. In: Proc. of 11th International Conference on Database Systems for Advanced Applications, pp. 420–436 (2006)
[17]
Oprea, A., Reiter, M.K.: Integrity checking in cryprographic file systems with constant trusted storage. In: Proc. USENIX Security Symposium (USENIX), pp. 183–198 (2007)
[18]
Pugh W. Skip lists: a probabilistic alternative to balanced trees Commun. ACM 1990 33 6 668-676
[19]
Tamassia R. Di Battista G. and Zwick U. Authenticated data structures Algorithms - ESA 2003 2003 Heidelberg Springer 2-5
[20]
Tamassia, R., Triandopoulos, N.: On the cost of authenticated data structures. Technical report, Center for Geometric Computing, Brown University, Available (2003), from http://www.cs.brown.edu/cgc/stms/papers/costauth.pdf
[21]
Tamassia R. and Triandopoulos N. Caires L., Italiano G.F., Monteiro L., Palamidessi C., and Yung M. Computational bounds on hierarchical data processing with applications to information security Automata, Languages and Programming 2005 Heidelberg Springer 153-165

Cited By

View all

Index Terms

  1. Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Information & Contributors

            Information

            Published In

            cover image Guide Proceedings
            Information and Communications Security: 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings
            Dec 2007
            520 pages
            ISBN:978-3-540-77047-3
            DOI:10.1007/978-3-540-77048-0
            • Editors:
            • Sihan Qing,
            • Hideki Imai,
            • Guilin Wang

            Publisher

            Springer-Verlag

            Berlin, Heidelberg

            Publication History

            Published: 12 December 2007

            Author Tags

            1. Authentication Protocol
            2. Search Path
            3. Authentication Service
            4. Consistency Proof
            5. Outsource Data

            Qualifiers

            • Article

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 10 Oct 2024

            Other Metrics

            Citations

            Cited By

            View all
            • (2023)Limits on Revocable Proof Systems, With Implications for Stateless BlockchainsFinancial Cryptography and Data Security10.1007/978-3-031-47751-5_4(54-71)Online publication date: 1-May-2023
            • (2022)Verifiable Computation over Large Database with Incremental UpdatesComputer Security - ESORICS 201410.1007/978-3-319-11203-9_9(148-162)Online publication date: 10-Mar-2022
            • (2019)Secure data stream outsourcing with publicly verifiable integrity in cloud storageJournal of Information Security and Applications10.1016/j.jisa.2019.10239249:COnline publication date: 1-Dec-2019
            • (2017)Improving Authenticated Dynamic Dictionaries, with Applications to CryptocurrenciesFinancial Cryptography and Data Security10.1007/978-3-319-70972-7_21(376-392)Online publication date: 3-Apr-2017
            • (2013)Database Outsourcing with Hierarchical Authenticated Data StructuresInformation Security and Cryptology -- ICISC 201310.1007/978-3-319-12160-4_23(381-399)Online publication date: 27-Nov-2013
            • (2008)Authenticated hash tablesProceedings of the 15th ACM conference on Computer and communications security10.1145/1455770.1455826(437-448)Online publication date: 27-Oct-2008

            View Options

            View options

            Get Access

            Login options

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media