A new query integrity verification method for encrypted data in database outsourcing

    Research output: Contribution to conferenceConference paperpeer-review

    Abstract

    In database outsourcing, two issues of data security emerge: data confidentiality and data integrity. Existing data transformation schemes were widely studied for preserving data confidentiality, but they are vulnerable to data leakage problem because they do not consider data distribution when encrypting data. Meanwhile, query authentication schemes verifying data integrity, suffer from transmission overhead for verification data. In this paper, we propose a privacy-aware query authentication scheme which guarantees the data confidentiality and the query result integrity of sensitive data. To solve the original data leakage problem, we propose a bitmap-based data transformation scheme with anchor selection based on data distribution. Also, we devise a query result authentication index that stores an encrypted signature for each anchor so that it can reduce the amount of auditing data. Through performance evaluation, we show that our scheme outperforms the state-of-the-art method in terms of query processing time and verification overhead.

    Original languageEnglish
    Title of host publicationAdvanced Multimedia and Ubiquitous Engineering - Future Information Technology
    EditorsNeil Y. Yen, James J. Park, Han-Chieh Chao, Hamid Arabnia
    PublisherSpringer Verlag
    Pages67-72
    Number of pages6
    ISBN (Electronic)9783662474860
    DOIs
    StatePublished - 2015
    Event10th International Conference on Future Information Technology, FutureTech 2015 - Hanoi, Viet Nam
    Duration: 2015.05.182015.05.20

    Publication series

    NameLecture Notes in Electrical Engineering
    Volume352
    ISSN (Print)1876-1100
    ISSN (Electronic)1876-1119

    Conference

    Conference10th International Conference on Future Information Technology, FutureTech 2015
    Country/TerritoryViet Nam
    CityHanoi
    Period15.05.1815.05.20

    Keywords

    • Data confidentiality
    • Data transformation
    • K-NN query processing algorithm
    • Query result authentication

    Quacquarelli Symonds(QS) Subject Topics

    • Engineering - Mechanical

    Fingerprint

    Dive into the research topics of 'A new query integrity verification method for encrypted data in database outsourcing'. Together they form a unique fingerprint.

    Cite this