期刊文献+

外包数据中基于链表的B+树数据完整性检测算法研究

Data Integrity Checking Algorithm Research in Outsource Data based on B+Tree of the Linked List
下载PDF
导出
摘要 外包数据是数据拥有者将自己的数据存储在第三方服务提供商的服务器上,数据完整性检测的目标是防止存储在不可信的第三方服务器上的数据被篡改,验证数据是否可信。在基于B+树完整性检测算法的研究基础上,提出一种基于链表的B+树完整性检测算法,给出算法的数据结构定义及分析验证过程。该算法数据结构是通过单循环链表与B+树相结合,动态的获取链表中数据的验证信息,同时在B+树的叶子结点存储一个链表,增加了存储空间效率。实验表明,当数据增大时,基于链表的B+树与B+树在查询时间上相比略有优势,在插入数据时,优势明显。 Outsourcing data is what the users store their own data in a third-party service provider's server,and the goal of data integrity checking protection is to prevent data which is in storage in a distrusted third-party server from being tampered and verify the data whether it is credible or not.Based on B +tree integrity checking algorithm in this paper,a data integrity checking algorithm based on B+tree of the linked list has been put forward and the data structure definition of algorithm and the verification of analysis have been given. The scheme obtains the authentication information dynamically in linked list by means of combining single circular linked list with B +tree,at the same time,it can increase the storage space and efficiency by means of storing a linked list in leaf nodes of the B+tree.Experiment shows that when the data increases,the B+tree based on linked list has a slight advantage in comparison to B+ in the query time,while when inserting data,the advantage is obvious.
出处 《成都信息工程大学学报》 2016年第4期377-381,共5页 Journal of Chengdu University of Information Technology
关键词 外包数据 链表 B+树 完整性检测 算法 数据结构定义 数据安全 outsource data linked list B+tree integrity checking algorithm data structure definition data security
  • 相关文献

参考文献5

二级参考文献43

  • 1Hakan Hacigumtis, Bala Iyer, Chen Li, et al. Executing SQL over encrypted data in the database-service-provider model [C] //Proc of ACM SIGMOD 2001. New York, ACM, 2001:223-234.
  • 2Agrawal R, Kierman J, Srikant R, et al. Order preserving encryption for numeric data [C] //Proc of ACM SIGMOND 2004. New York: ACM, 2004:563-574.
  • 3Bellare M, Garay J, Rabin T. Fast batch verification for modular exponentiation and digital signatures [G] //LNCS 1043: Advances in Gryptology Eurocrypt'98. Berlin: Springer, 1998.
  • 4Merkle R. A certified digital signature [G] //LNCS 435: Advance in Cryptology-Crypto'89. Berlin: Springer, 1990: 218- 238.
  • 5Devanbu P, Gertz M, Martel C, et al. Authentic data publication over the Internet [J]. Journal of Computer Security, 2003, 11 (3) :291-314.
  • 6Pang H, Tan K L. Authenticating query results in edge computing [C] //Proc of ICDE 2004. Washington: IEEE Computer Society, 2004:560-571.
  • 7Mykletun E, Narasimha M, Tsudik G. Authentication and integrity in outsourced databases [J]. ACM Trans on Storage, 2006, 2(2): 107-138.
  • 8Xie Min, Wang Haixun, Yin Jian, et al. Integrity auditing of outsourced data[C] //Proc of VLDB 2007. New York: ACM, 2007:782-793.
  • 9Narasimha M, Tsudik G. DSAC: Integrity of outsourced databases with signature aggregation and chaining [C]//Proc of the ACM Conf on Information and Knowledge Management. New York: ACM, 2005:235-236.
  • 10Pang Hweehwa, Tan Kian-Lee. Verifying completeness of relational query answers from online servers [J]. ACM Trans on Information and System Security, 2008, 11(2) : 1-50.

共引文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部