期刊文献+

外包数据库模型中的完整性检测方案 被引量:23

An Integrity Checking Scheme in Outsourced Database Model
下载PDF
导出
摘要 外包数据库模型中完整性保护的目标是防止数据库服务提供商篡改数据库内容,完整性检测方案的作用是让查询方能够验证查询结果是真实的、未被篡改的.在现有的基于验证数据结构方法的基础上进行改进,提出了一种以带掩码的验证树作为核心数据结构的完整性检测方案,给出了数据结构的形式化定义并证明了其安全性.该方案将数据结构中共同的计算信息抽取到两个掩码向量中,通过避免使用大量幂指数运算,降低了查询验证过程的计算代价,减少了查询验证的时间.其特有的验证数据结构增量更新的优点能够提高数据库更新的执行效率.实验表明,该方案在查询验证时间上略优于现有的同类型方案,在数据更新性能上较同类方案具有明显优势. In the outsourced database model, databases face potential threats from malicious database service providers. Security mechanisms are needed to assure the queriers that the query results have not been tempered with and are authentic with respect to the actual data owner. As an improvement of the existing authenticated-data-structure-based methods, a new integrity checking scheme is proposed using the masked authenticating B+-tree (MABTree) as the underlying data structure. Common computational information is extracted from the MABTree and is stored in two mask vectors, so as to make the computation in the data structure more efficient. By avoiding mass exponential computation, the scheme reduces both the computational overhead in the integrity check process and the verification time of the query results. The MABTree is designed to support incremental updating, which makes the scheme more efficient when the owner updates the data and the authenticated data structures are updated accordingly. The security proof of the scheme is presented together with the formal definition of the MABTree. Experiments show that, compared with the existing methods, the proposed scheme has a better performance in query verification and a much better performance in the authenticated data structure updating operations.
出处 《计算机研究与发展》 EI CSCD 北大核心 2010年第6期1107-1115,共9页 Journal of Computer Research and Development
基金 国家"八六三"高技术研究发展计划基金项目(2007AA120404 2007AA120405) 国家科技支撑计划基金项目(2006BAH02A02)
关键词 数据库安全 外包数据库完整性 带掩码的验证树 验证数据结构 验证时间 database security outsourced database integrity MABTree authenticated data structure verification time
  • 相关文献

参考文献20

  • 1Hacigumus H, Iyer B R, Mehrotra S. Providing database as a service [C] //Proc of ICDE. Washington:IEEE Computer Society, 2002:29-40.
  • 2Li F F, Hadjieleftheriou M, Kollios G. Dynamic authenticated index structures for outsourced databases [C]//Proc of ACM SIGMOD2006. New York: ACM, 2006:121-132.
  • 3Hakan Hacigumtis, Bala Iyer, Chen Li, et al. Executing SQL over encrypted data in the database-service-provider model [C] //Proc of ACM SIGMOD 2001. New York, ACM, 2001:223-234.
  • 4Agrawal R, Kierman J, Srikant R, et al. Order preserving encryption for numeric data [C] //Proc of ACM SIGMOND 2004. New York: ACM, 2004:563-574.
  • 5咸鹤群,冯登国.支持属性粒度数据库加密的查询重写算法[J].计算机研究与发展,2008,45(8):1307-1314. 被引量:10
  • 6Bellare M, Garay J, Rabin T. Fast batch verification for modular exponentiation and digital signatures [G] //LNCS 1043: Advances in Gryptology Eurocrypt'98. Berlin: Springer, 1998.
  • 7Merkle R. A certified digital signature [G] //LNCS 435: Advance in Cryptology-Crypto'89. Berlin: Springer, 1990: 218- 238.
  • 8Devanbu P, Gertz M, Martel C, et al. Authentic data publication over the Internet [J]. Journal of Computer Security, 2003, 11 (3) :291-314.
  • 9Pang H, Tan K L. Authenticating query results in edge computing [C] //Proc of ICDE 2004. Washington: IEEE Computer Society, 2004:560-571.
  • 10Mykletun E, Narasimha M, Tsudik G. Authentication and integrity in outsourced databases [J]. ACM Trans on Storage, 2006, 2(2): 107-138.

二级参考文献28

  • 1朱勤,于守健,乐嘉锦.数据库水印研究与进展[J].计算机工程与应用,2006,42(29):198-201. 被引量:17
  • 2朱勤,于守健,乐嘉锦,骆轶姝.外包数据库系统安全机制研究[J].计算机科学,2007,34(2):152-156. 被引量:17
  • 3HACIGUMUS H, LYER B, MEHROTRA S. Providing database as a service [ C]// Proceedings of the 18th International Conference on Data Engineering. Washington, DC: IEEE Computer Society, 2002: 29.
  • 4MYKLETUN E, NARASIMHA M, TSUDIK G. Authentication and integrity in outsourced databases [ J]//ACM Transactions on Storage (TOS), 2006,2(2):107 - 138.
  • 5DEVANBU P, GERTZ M, MARTEL C, et al. Authentic third-party data publication [ C]// Proceedings of the IFIP TC11/ WG11. 3 Fourteenth Annual Working Conference on Database. The Netherlands: Kluwer, B.V. Deventer, 2000:101 - 112.
  • 6PANG H, JAIN A, RAMAMR1THAM K, et al. Verifying completeness of relational query results in data publishing [ C]//Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data. New York: ACM Press, 2005:407 -418.
  • 7MARTEL C, NUCKOLLS G, DEVANBU P, et al. A general model for authenticated data structures [ J]. Algorithmica, 2004, 39 (1) : 21 -41.
  • 8LI FEI-FEI, HADJIELEFTHERIOU M, KOLLIOS G, et al. Dynamic authenticated index structures for outsourced databases [ C]//Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data. New York: ACM Press, 2006:121 - 132.
  • 9NARASIMHA M, TSUDIK G. Authentication of Outsourced Databases using Signature Aggregation and Chaining [ C]//LNCS3882. Heidelberg: Springer, 2006:420 - 436.
  • 10BOUGANIM L, NGOC F D, PUCHERAL P, et al. Chip-secured data access: Reconciling access rights with data encryption [ C]// Proceedings of the 29th International Conference on Very Large Data Bases. VLDB Endowment, 2003:1133 - 1136.

共引文献13

同被引文献306

引证文献23

二级引证文献214

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部