Skip to main navigation Skip to search Skip to main content

Clustering-based query result authentication for encrypted databases in cloud

  • Miyoung Jang
  • , Min Yoon
  • , Deulnyeok Youn
  • , Jae Woo Chang*
  • *Corresponding author for this work

    Research output: Contribution to conferenceConference paperpeer-review

    Abstract

    Due to advancement in cloud computing technology, the research on the outsourced database has been spotlighted. Consequently, it is becoming more important to guarantee the correctness and completeness of query result in this environment. The existing data encryption schemes do not consider data distribution when encrypting original data. And existing query result integrity methods have limitation of verification object transmission overheads. To resolve these problems, we propose a clustering-based data transformation technique and a privacy-aware query authentication index. Our clustering-based data transformation scheme is designed to select anchors based on data distribution. For the integrity of query results, our query result authentication index stores an encrypted signature for each anchor and compares the anchor signature with the verification data from the data owner. Through performance evaluation, we show that our method outperforms the existing method up to 15 times in terms of query processing time and verification.

    Original languageEnglish
    Title of host publicationProceedings - 16th IEEE International Conference on High Performance Computing and Communications, HPCC 2014, 11th IEEE International Conference on Embedded Software and Systems, ICESS 2014 and 6th International Symposium on Cyberspace Safety and Security, CSS 2014
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages1076-1082
    Number of pages7
    ISBN (Electronic)9781479961238
    DOIs
    StatePublished - 2014.03.9
    Event16th IEEE International Conference on High Performance Computing and Communications, HPCC 2014, 11th IEEE International Conference on Embedded Software and Systems, ICESS 2014 and 6th International Symposium on Cyberspace Safety and Security, CSS 2014 - Paris, France
    Duration: 2014.08.202014.08.22

    Publication series

    NameProceedings - 16th IEEE International Conference on High Performance Computing and Communications, HPCC 2014, 11th IEEE International Conference on Embedded Software and Systems, ICESS 2014 and 6th International Symposium on Cyberspace Safety and Security, CSS 2014

    Conference

    Conference16th IEEE International Conference on High Performance Computing and Communications, HPCC 2014, 11th IEEE International Conference on Embedded Software and Systems, ICESS 2014 and 6th International Symposium on Cyberspace Safety and Security, CSS 2014
    Country/TerritoryFrance
    CityParis
    Period14.08.2014.08.22

    Keywords

    • Database outsourcing
    • database transformation technique
    • hash-based signature index
    • query result integrity auditing method

    Quacquarelli Symonds(QS) Subject Topics

    • Computer Science & Information Systems
    • Engineering - Electrical & Electronic
    • Engineering - Petroleum
    • Data Science

    Fingerprint

    Dive into the research topics of 'Clustering-based query result authentication for encrypted databases in cloud'. Together they form a unique fingerprint.

    Cite this