Abstract
Cloud computing has been spotlighted as a new paradigm of database management system. However, privacy needs to be preserved for databases that are valuable and sensitive against unauthorized accesses. For this, two issues of data security, including data confidentiality and query result integrity, become major concerns for users. Existing bucket-based data authentication methods have problems of data disclosure and transmission overhead, due to the unsophisticated data grouping strategy. In this paper, we propose a privacy-aware query authentication index which guarantees data confidentiality and query result integrity for users. We privately partition a spatial database into small groups by using periodic function and generate a signature of each group. The group signature is used to check the correctness and completeness of outsourced data when answering a range query to users. Through performance evaluation, it is shown that proposed method outperforms the existing method in terms of range query processing time up to 3 times.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
FIP Standard (2001) Advanced encryption standard (AES). National Institute of Standards and Technology (NIST)
Chow CY, Mokbel MF, Liu X (2011) Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica 15(2):351–380
Kerr S, Krkpatrick MS, Bertino E (2010) PEAR: a hardware based protocol authentication system. In: Proceedings of the 3rd ACM SIGSPATIAL international workshop on security and privacy in GIS and LBS, pp 18–25
Wang J et al (2010) Bucket-based authentication for outsourced databases. Concurrency Comput Pract Experience 22(9):1160–1180
Mykletun E, Narasimha M, Tsudik G (2004) Signature bouquets: immutability for aggregated/condensed signatures. In: European symposium on research in computer security (ESORICS), pp 160–176
Mykletun E, Narasimha M, Tsudik G (2006) Authentication and integrity in outsourced databases. J ACM Trans Storage (TOS) 2(2):107–138
Merkle RC (1990) A certified digital signature. Advances in cryptology—CRYPTO’89 proceedings. Springer, New York, pp 218–238
Narasimha M, Tsudik G (2005) DSAC: integrity for outsourced databases with signature aggregation and chaining. In: Proceedings of the 14th ACM international conference on information and knowledge management, ACM, New york, pp 235–236
Sacharidis D, Mouratidis K, Papadias D (2010) k-Anonymity in the presence of external databases. IEEE Trans Knowl Data Eng 22(3):392–403
Yang Y, Papadias D, Papadopoulos S, Kalnis P (2009) Authenticated join processing in outsourced databases. In: ACM SIGMOD international conference on management of data, ACM, New york, pp 5–18
Liu D, Wang S, (2012) Query encrypted databases practically. In: Proceedings of the ACM conference on computer and communications security, ACM, New York, pp 1049–1051
Hore B et al (2012) Secure multidimensional range queries over outsourced data. Int J Very Large Data Bases 21(3):333–358
Balpande S et al (2012) Data integrity and confidentiality in outsourced database. In: International conference and workshop on recent trends in technology, (TCET)
Devanbu P, Gertz M, Martel C, Stubblebine S (2003) Authentic data publication over the internet. J Comput Secur 11(3):291–314
Hacigumus H, Iyer B, Li C, Mehrotra S, (2002) Executing SQL over encrypted data in the database service provider model. ACM SIGMOD, New York, pp 216–227
Hore B, Mehrotra S, Tsudik G (2004) A privacy-preserving index for range queries. In: Proceedings of the 30th international conference on very large data bases-Volume 30, VLDB Endowment, pp 720–731
Wang J, Du X (2008) A secure multi-dimensional partition based index in DAS. Progress in WWW research and development. Springer, Heidelberg, pp 319–330
Wang C, Ku W, (2012) Efficient evaluation of skyline queries in wireless data broadcast environments. In: Proceedings of the 20th international conference on advances in geographic information systems, ACM, New York, pp 442–445
Rivest R, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126
Theodoridis Y, Silva J, Nascimento M (1999) On the generation of spatiotemporal datasets. Adv spat databases. Springer. Heidelberg, pp 147–164
Acknowledgments
This research was supported by Basic Science Research program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (grant number 2013010099)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Jang, M., Jo, A., Chang, JW. (2015). Encrypted Data Group Authentication for Outsourced Databases. In: Park, J., Pan, Y., Chao, HC., Yi, G. (eds) Ubiquitous Computing Application and Wireless Sensor. Lecture Notes in Electrical Engineering, vol 331. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-9618-7_74
Download citation
DOI: https://doi.org/10.1007/978-94-017-9618-7_74
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-017-9617-0
Online ISBN: 978-94-017-9618-7
eBook Packages: EngineeringEngineering (R0)