Publication:
Database outsourcing with hierarchical authenticated data structures

dc.contributor.departmentN/A
dc.contributor.departmentDepartment of Computer Engineering
dc.contributor.kuauthorEtemad, Mohammad
dc.contributor.kuauthorKüpçü, Alptekin
dc.contributor.kuprofilePhD Student
dc.contributor.kuprofileFaculty Member
dc.contributor.otherDepartment of Computer Engineering
dc.contributor.schoolcollegeinstituteGraduate School of Sciences and Engineering
dc.contributor.schoolcollegeinstituteCollege of Engineering
dc.contributor.yokidN/A
dc.contributor.yokid168060
dc.date.accessioned2024-11-09T23:27:53Z
dc.date.issued2014
dc.description.abstractIn an outsourced database scheme, the data owner delegates the data management tasks to a remote service provider. At a later time, the remote service is supposed to answer any query on the database. The essential requirements are ensuring the data integrity and authenticity with efficientmechanisms. Current approaches employ authenticated data structures to store security information, generated by the client and used by the server, to compute proofs that show the answers to the queries are authentic. The existing solutions have shortcomings with multi-clause queries and duplicate values in a column. We propose a hierarchical authenticated data structure for storing security information, which alleviates the mentioned problems. We provide a unified formal definition of a secure outsourced database scheme, and prove that our proposed scheme is secure according to this definition, which captures previously separate properties such as correctness, completeness, and freshness. The performance evaluation based on our prototype implementation confirms the efficiency of the proposed outsourced database scheme, showing more than 50% decrease in proof size and proof generation time compared to previous work, and about 1-20% communication overhead compared to the query result size.
dc.description.indexedbyWoS
dc.description.indexedbyScopus
dc.description.openaccessYES
dc.description.volume8565
dc.identifier.doi10.1007/978-3-319-12160-4_23
dc.identifier.eissn1611-3349
dc.identifier.isbn978-3-319-12160-4
dc.identifier.isbn978-3-319-12159-8
dc.identifier.issn0302-9743
dc.identifier.scopus2-s2.0-84911095724
dc.identifier.urihttp://dx.doi.org/10.1007/978-3-319-12160-4_23
dc.identifier.urihttps://hdl.handle.net/20.500.14288/11771
dc.identifier.wos345114800023
dc.languageEnglish
dc.publisherSpringer International Publishing Ag
dc.sourceInformation Security And Cryptology - Icisc 2013
dc.subjectComputer science
dc.subjectInformation systems
dc.subjectTheory methods
dc.titleDatabase outsourcing with hierarchical authenticated data structures
dc.typeConference proceeding
dspace.entity.typePublication
local.contributor.authoridN/A
local.contributor.authorid0000-0003-2099-2206
local.contributor.kuauthorEtemad, Mohammad
local.contributor.kuauthorKüpçü, Alptekin
relation.isOrgUnitOfPublication89352e43-bf09-4ef4-82f6-6f9d0174ebae
relation.isOrgUnitOfPublication.latestForDiscovery89352e43-bf09-4ef4-82f6-6f9d0174ebae

Files