CFP last date
20 December 2024
Reseach Article

Data Integrity and Confidentiality in Outsourced Database

Published on March 2012 by Sonal Balpande, Rajashree Shegde, Lata Ragha
International Conference and Workshop on Emerging Trends in Technology
Foundation of Computer Science USA
ICWET2012 - Number 10
March 2012
Authors: Sonal Balpande, Rajashree Shegde, Lata Ragha
0d94d6ed-83a0-4971-b2f0-b97f1d2f8e10

Sonal Balpande, Rajashree Shegde, Lata Ragha . Data Integrity and Confidentiality in Outsourced Database. International Conference and Workshop on Emerging Trends in Technology. ICWET2012, 10 (March 2012), 1-4.

@article{
author = { Sonal Balpande, Rajashree Shegde, Lata Ragha },
title = { Data Integrity and Confidentiality in Outsourced Database },
journal = { International Conference and Workshop on Emerging Trends in Technology },
issue_date = { March 2012 },
volume = { ICWET2012 },
number = { 10 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/icwet2012/number10/5382-1073/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference and Workshop on Emerging Trends in Technology
%A Sonal Balpande
%A Rajashree Shegde
%A Lata Ragha
%T Data Integrity and Confidentiality in Outsourced Database
%J International Conference and Workshop on Emerging Trends in Technology
%@ 0975-8887
%V ICWET2012
%N 10
%P 1-4
%D 2012
%I International Journal of Computer Applications
Abstract

An increasing number of enterprises outsource their IT functions or business processes to third-parties who offer these services with a lower cost due to the economy of scale. Quality of service has become a major concern in outsourcing. When database owners outsourced their data to service providers, which might be untrusted or compromised, two issues of data security emerge, data confidentiality and data integrity. Most of the previous research focuses on only one issue and the solution to integrate two approaches is expensive. Furthermore, no solution is raised on various character queries. We propose an approach which keeps data confidentiality and integrity. The proposed approach is based on bin checksum, which can be used to check correctness, completeness and freshness of multiple tuples at one time.

References
  1. H. Hacigumus, B. R. Iyer, and S. Mehrotra, “Providing database as a service,” In Proceedings of International Conference on Data Engineering (ICDE), 2002.
  2. E. Mykletun, M. Narasimha, G. Tsudik, “Authentication and Integrity in Outsourced Databases,” ACM Transactions on Storage, 2(2):107–138, 2006.
  3. Pang H, Jain A, Ramamritham K, Tan K., “Verifying completeness of relational query results in data publishing,” SIGMOD, Baltimore, MD, U.S.A., June 2005
  4. Devanbu, M. Gertz, C. Martel, S.G. Stubblebine, “Authentic Third-party Data Publication,” In Proc. of the 14th Annual IFIP WG 11.3 Working Conference on Database Security, School, the Netherlands, 2000.
  5. Li F, Hadjieleftheriou M, Kollios G, Reyzin L. Dynamic authenticated index structures for Outsourced databases. SIGMOD, Chicago, IL, U.S.A., June 2006
  6. Stavros Papadopoulos, Dimitris Papadias, Weiwei Cheng, Kian-Lee Tan, “Separating Authentication from Query Execution in Outsourced Databases,” 2009.
  7. Jieping Wang, Xiaoyong Du, Jiaheng Lu,.and Wei Lu1., “ Bucket-based authentication for outsourced databases,” Concurrency and Computation: Practical and Experience. 2010.
  8. Ning Wang, Wei Zhao, Ying Wang, Guohua Liu., “Character Mapping Cipher Index Scheme for Character Data in Outsourced Databases,” International Conference on Computational Intelligence and Security, 2009
  9. Bellare M, Micciancio D., “A new paradigm for collision-free hashing: Incrementality reduced cost,” Eurocrypt (Lecture Notes in Computer Science, vol. 1233). Springer: Berlin, 11–15 May 1997; 163–192
  10. Hacigumus H, Iyer B, Li C, Mehrotra S., “Executing SQL over encrypted data in the Database service provider modelling,” ACM SIGMOD. Madison: Academic, 2002
  11. Damiani E, Vimercati SDC, Jajodia S, Paraboschi S, Samarati P., “Balancing Confidentiality and efficiency in untrusted relational DBMSs,” ACM Conference on Computer and Communications Security, Washington, DC, U.S.A., October 2003.
  12. Jieping Wang, Xiaoyong Du., “Cluster Based Partition for Multi-dimensional Range Query in DAS Model,” Eighth IEEE/ACIS International Conference on Computer and Information Science 2009
  13. Wang J, Du X. LOB: Bucket based index for range queries. WAIM, Zhangjiajie, China, 27–29 August 2008.
  14. LeFevre K, DeWitt D, Ramakrishnan R. Mondrian, “Multidimensional k-anonymity,” ICDE, Atlanta, GA, U.S.A., 3–7 April 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Data Integrity Data confidentiality Outsourced database