Verifiable Auditing for Outsourced Database in Cloud Computing
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wang, Jianfeng | - |
dc.contributor.author | Chen, Xiaofeng | - |
dc.contributor.author | Huang, Xinyi | - |
dc.contributor.author | You, Ilsun | - |
dc.contributor.author | Xiang, Yang | - |
dc.date.accessioned | 2021-08-11T19:26:10Z | - |
dc.date.available | 2021-08-11T19:26:10Z | - |
dc.date.issued | 2015-11 | - |
dc.identifier.issn | 0018-9340 | - |
dc.identifier.issn | 1557-9956 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/10189 | - |
dc.description.abstract | The notion of database outsourcing enables the data owner to delegate the database management to a cloud service provider (CSP) that provides various database services to different users. Recently, plenty of research work has been done on the primitive of outsourced database. However, it seems that no existing solutions can perfectly support the properties of both correctness and completeness for the query results, especially in the case when the dishonest CSP intentionally returns an empty set for the query request of the user. In this paper, we propose a new verifiable auditing scheme for outsourced database, which can simultaneously achieve the correctness and completeness of search results even if the dishonest CSP purposely returns an empty set. Furthermore, we can prove that our construction can achieve the desired security properties even in the encrypted outsourced database. Besides, the proposed scheme can be extended to support the dynamic database setting by incorporating the notion of verifiable database with updates. | - |
dc.format.extent | 11 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Institute of Electrical and Electronics Engineers | - |
dc.title | Verifiable Auditing for Outsourced Database in Cloud Computing | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1109/TC.2015.2401036 | - |
dc.identifier.wosid | 000362743300021 | - |
dc.identifier.bibliographicCitation | IEEE Transactions on Computers, v.64, no.11, pp 3293 - 3303 | - |
dc.citation.title | IEEE Transactions on Computers | - |
dc.citation.volume | 64 | - |
dc.citation.number | 11 | - |
dc.citation.startPage | 3293 | - |
dc.citation.endPage | 3303 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | sci | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordPlus | VERIFICATION | - |
dc.subject.keywordAuthor | Integrity auditing | - |
dc.subject.keywordAuthor | database encryption | - |
dc.subject.keywordAuthor | outsourcing computation | - |
dc.subject.keywordAuthor | cloud computing | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.