Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2699026.2699135acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
poster

ABSS: An Attribute-based Sanitizable Signature for Integrity of Outsourced Database with Public Cloud

Published: 02 March 2015 Publication History
  • Get Citation Alerts
  • Abstract

    Database outsourcing is an important application of cloud computing, and security is one of the most critical concerns in adopting this application model, such as data privacy, query privacy, etc. Data integrity is another essential requirement for outsourced database system. When the database is outsourced to public cloud, the situation is more complex as different users may modify the data and these users may hold different privileges for different parts of the database. Furthermore, as the cloud is in charge of the management of the database, users have to rely on the cloud to guarantee data integrity. We propose ABSS to protect the integrity of outsourced database which supports fine-grained modification policy. ABSS utilizes an attribute based sanitizable signature scheme, which combining the ingredients of attribute based encryption and sanitizable signature. ABSS enables the database owner to deploy fine-grained policy of database modification and can detect illegal modifications without trusting the cloud. We also discuss the security properties and performance of ABSS to show its practicability.

    References

    [1]
    Apache. Accumulo https://accumulo.apache.org/.
    [2]
    G. Ateniese, D. H. Chou, B. de Medeiros, and G. Tsudik. Sanitizable signatures. In S. D. C. di Vimercati, P. F. Syverson, and D. Gollmann, editors, European Symposium on Research in Computer Security - ESORICS 2005, volume 7459 of LNCS, pages 159--177. Springer-Verlag, 2005.
    [3]
    G. Ateniese and B. de Medeiros. On the key exposure problem in chameleon hashes. In C. Blundo and S. Cimato, editors, Security in Communication Networks - SCN 2004, volume 3352 of LNCS, pages 165--179. Springer-Verlag, 2004.
    [4]
    S. Bajaj and R. Sion. TrustedDB: A trusted hardware-based database with privacy and data confidentiality. IEEE Transactions on Knowledge and Data Engineering, 26(3):752--765, 2014.
    [5]
    J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy - S&P 2007, pages 321--334. IEEE Computer Society, 2007.
    [6]
    Y. Deswarte, J.-J. Quisquater, and A. Saïdane. Remote integrity checking. In Integrity and Internal Control in Information Systems VI, pages 1--11. Springer, 2004.
    [7]
    H. Hacigumus, B. R. Iyer, C. Li, and S. Mehrotra. Executing sql over encrypted data in the database-service-provider model. In M. J. Franklin, B. Moon, and A. Ailamaki, editors, Proceedings of the ACM International Conference on Management of Data - SIGMOD 2002, pages 216--227. ACM, 2002.
    [8]
    H. Hacigumus, B. Iyer, and S. Mehrotra. Ensuring the integrity of encrypted databases in the database-as-a-service model. In Data and Applications Security XVII, pages 61--74. Springer, 2004.
    [9]
    M. Klonowski and A. Lauks. Extended sanitizable signatures. In M. S. Rhee and B. Lee, editors, Information Security and Cryptology - ICISC 2006, volume 4296 of LNCS, pages 343--355. Springer-Verlag, 2006.
    [10]
    M. Narasimha and G. Tsudik. Dsac: integrity for outsourced databases with signature aggregation and chaining. In Proceedings of the 14th ACM international conference on Information and knowledge management, pages 235--236. ACM, 2005.
    [11]
    R. Sion. Query execution assurance for outsourced databases. In Proceedings of the 31st international conference on Very large data bases, pages 601--612. VLDB Endowment, 2005.
    [12]
    H. Wang, J. Yin, C.-s. Perng, C.-s., and P. S. Yu. Dual encryption for query integrity assurance. In Proceedings of the 17th ACM conference on Information and knowledge management, pages 863--872. ACM, 2008.
    [13]
    Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S. Yau. Dynamic audit services for integrity verification of outsourced storages in clouds. In Proceedings of the 2011 ACM Symposium on Applied Computing, pages 1550--1557. ACM, 2011.

    Cited By

    View all
    • (2022)Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud StorageIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.310040119:5(3448-3463)Online publication date: 1-Sep-2022
    • (2018)FABSS: Attribute-Based Sanitizable Signature for Flexible Access StructureInformation and Communications Security10.1007/978-3-319-89500-0_3(39-50)Online publication date: 10-Apr-2018
    • (2017)SecureNoSQLInternational Journal of Information Management: The Journal for Information Professionals10.1016/j.ijinfomgt.2016.11.00537:2(63-74)Online publication date: 1-Apr-2017
    • Show More Cited By

    Index Terms

    1. ABSS: An Attribute-based Sanitizable Signature for Integrity of Outsourced Database with Public Cloud

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CODASPY '15: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy
      March 2015
      362 pages
      ISBN:9781450331913
      DOI:10.1145/2699026
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 02 March 2015

      Check for updates

      Author Tags

      1. access control
      2. cloud computing
      3. cloud storage
      4. database
      5. integrity

      Qualifiers

      • Poster

      Conference

      CODASPY'15
      Sponsor:

      Acceptance Rates

      CODASPY '15 Paper Acceptance Rate 19 of 91 submissions, 21%;
      Overall Acceptance Rate 149 of 789 submissions, 19%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)9
      • Downloads (Last 6 weeks)0

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud StorageIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.310040119:5(3448-3463)Online publication date: 1-Sep-2022
      • (2018)FABSS: Attribute-Based Sanitizable Signature for Flexible Access StructureInformation and Communications Security10.1007/978-3-319-89500-0_3(39-50)Online publication date: 10-Apr-2018
      • (2017)SecureNoSQLInternational Journal of Information Management: The Journal for Information Professionals10.1016/j.ijinfomgt.2016.11.00537:2(63-74)Online publication date: 1-Apr-2017
      • (2016)A survey of big data managementJournal of Network and Computer Applications10.1016/j.jnca.2016.04.00871:C(151-166)Online publication date: 1-Aug-2016

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media