Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Verifiable Auditing for Outsourced Database in Cloud Computing

Full metadata record
DC Field Value Language
dc.contributor.authorWang, Jianfeng-
dc.contributor.authorChen, Xiaofeng-
dc.contributor.authorHuang, Xinyi-
dc.contributor.authorYou, Ilsun-
dc.contributor.authorXiang, Yang-
dc.date.accessioned2021-08-11T19:26:10Z-
dc.date.available2021-08-11T19:26:10Z-
dc.date.issued2015-11-
dc.identifier.issn0018-9340-
dc.identifier.issn1557-9956-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/10189-
dc.description.abstractThe notion of database outsourcing enables the data owner to delegate the database management to a cloud service provider (CSP) that provides various database services to different users. Recently, plenty of research work has been done on the primitive of outsourced database. However, it seems that no existing solutions can perfectly support the properties of both correctness and completeness for the query results, especially in the case when the dishonest CSP intentionally returns an empty set for the query request of the user. In this paper, we propose a new verifiable auditing scheme for outsourced database, which can simultaneously achieve the correctness and completeness of search results even if the dishonest CSP purposely returns an empty set. Furthermore, we can prove that our construction can achieve the desired security properties even in the encrypted outsourced database. Besides, the proposed scheme can be extended to support the dynamic database setting by incorporating the notion of verifiable database with updates.-
dc.format.extent11-
dc.language영어-
dc.language.isoENG-
dc.publisherInstitute of Electrical and Electronics Engineers-
dc.titleVerifiable Auditing for Outsourced Database in Cloud Computing-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1109/TC.2015.2401036-
dc.identifier.wosid000362743300021-
dc.identifier.bibliographicCitationIEEE Transactions on Computers, v.64, no.11, pp 3293 - 3303-
dc.citation.titleIEEE Transactions on Computers-
dc.citation.volume64-
dc.citation.number11-
dc.citation.startPage3293-
dc.citation.endPage3303-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClasssci-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordPlusVERIFICATION-
dc.subject.keywordAuthorIntegrity auditing-
dc.subject.keywordAuthordatabase encryption-
dc.subject.keywordAuthoroutsourcing computation-
dc.subject.keywordAuthorcloud computing-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information Security Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE