The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - July-December (2013 vol.1)
pp: 187-200
Sabrina De Capitani di Vimercati , Università degli Studi di Milano, Milan
Sara Foresti , Università degli Studi di Milano, Milan
Sushil Jajodia , George Mason University, Fairfax
Stefano Paraboschi , Università degli Studi di Bergamo, Dalmine
Pierangela Samarati , Università degli Studi di Milano, Milan
ABSTRACT
We address the problem of providing users with the ability to assess the integrity of join results produced by external computational providers and computed over externally stored databases. Our approach relies on different mutually supporting techniques offering strong integrity protection guarantees at a limited cost. The application of the approach is completely transparent to the computational provider, against which data and query confidentiality are preserved. The paper introduces our techniques analytically, examining their protection guarantees and performance. It also illustrates experimental results, which confirm the effectiveness and efficiency of our solutions.
INDEX TERMS
Servers, Encryption, Cloud computing, Queueing analysis, Database systems, Cloud computing,salts and buckets, Cloud, query integrity, correctness, and completeness, twins, markers
CITATION
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Integrity for Join Queries in the Cloud", IEEE Transactions on Cloud Computing, vol.1, no. 2, pp. 187-200, July-December 2013, doi:10.1109/TCC.2013.18
REFERENCES
[1] A. Ceselli, E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, "Modeling and Assessing Inference Exposure in Encrypted Databases," ACM Trans. Information and System Security, vol. 8, no. 1, pp. 119-152, Feb. 2005.
[2] H. Hacigümüs, B. Iyer, and S. Mehrotra, "Providing Database As a Service," Proc. 18th Int'l Conf. Data Engineering (ICDE '02), Feb. 2002.
[3] H. Wang, J. Yin, C. Perng, and P. Yu, "Dual Encryption for Query Integrity Assurance," Proc. 17th ACM Conf. Information and Knowledge Management (CIKM '08), Oct. 2008.
[4] M. Xie, H. Wang, J. Yin, and X. Meng, "Integrity Auditing of Outsourced Data," Proc. 33rd Int'l Conf. Very Large Data Bases (VLDB '07), Sept. 2007.
[5] Y. Yang, D. Papadias, S. Papadopoulos, and P. Kalnis, "Authenticated Join Processing in Outsourced Databases," Proc. ACM Int'l Conf. Management of Data (SIGMOD '09), June/July. 2009.
[6] V. Varadharajan and U.K. Tupakula, "TREASURE: Trust Enhanced Security for Cloud Environments," Proc. IEEE 11th Int'l Conf. Trust, Security and Privacy in Computing and Comm. (TrustCom '12), June 2012.
[7] K.Y. Oktay, V. Khadilkar, B. Hore, M. Kantarcioglu, S. Mehrotra, and B.M. Thuraisingham, "Risk-Aware Workload Distribution in Hybrid Clouds," Proc. IEEE Fifth Int'l Conf. Cloud Computing, June 2012.
[8] D. Kossmann, T. Kraska, and S. Loesing, "An Evaluation of Alternative Architectures for Trans. Processing in the Cloud," Proc. ACM Int'l Conf. Management of Data (SIGMOD '10), June 2010.
[9] "The Transaction Processing Performance Council (Tpc) Benchmark H," http://www.tpc.orgtpch/, 2011.
[10] B. Carbunar and R. Sion, "Toward Private Joins on Outsourced Data," IEEE Trans. Knowledge and Data Engineering, vol. 24, no. 9, pp. 1699-1710, Sept. 2012.
[11] C. Curino et al., "Relational Cloud: A Database Service for the Cloud," Proc. Fifth Biennial Conf. Innovative Data Systems Research (CIDR '11), Jan. 2011.
[12] E. Curtmola, A. Deutsch, K. Ramakrishnan, and D. Srivastava, "Load-Balanced Query Dissemination in Privacy-Aware Online Communities," Proc. ACM Int'l Conf. Management of Data (SIGMOD '10), June 2010.
[13] S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Encryption Policies for Regulating Access to Outsourced Data," ACM Trans. Database Systems , vol. 35, no. 2, pp. 12:1-12:46, Apr. 2010.
[14] E. Mykletun, M. Narasimha, and G. Tsudik, "Authentication and Integrity in Outsourced Databases," ACM Trans. Storage , vol. 2, no. 2, pp. 107-138, May 2006.
[15] H. Pang and K. Tan, "Verifying Completeness of Relational Query Answers from Online Servers," ACM Trans. Information and System Security, vol. 11, no. 2, pp. 5:1-5:50, May 2008.
[16] K. Ren, C. Wang, and Q. Wang, "Security Challenges for the Public Cloud," IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, Jan.-Feb. 2012.
[17] C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, "Toward Secure and Dependable Storage Services in Cloud Computing," IEEE Trans. Services Computing, vol. 5, no. 2, pp. 220-232, Jan. 2012.
[18] H. Hacigümüs, B. Iyer, S. Mehrotra, and C. Li, "Executing SQL over Encrypted Data in the Database-Service-Provider Model." Proc. ACM Int'l Conf. Management of Data (SIGMOD '02), June 2002.
[19] H. Wang and L.V.S. Lakshmanan, "Efficient Secure Query Evaluation over Encrypted XML Databases," Proc. 32nd Int'l Conf. Very Large Data Bases (VLDB '06), Sept. 2006.
[20] H. Hacigümüs, B. Iyer, and S. Mehrotra, "Ensuring Integrity of Encrypted Databases in the Database-As-A-Service Model," Proc. IFIP WG11.3 Working Conf. Data and Application Security (DBSec '03), Aug. 2003.
[21] P. Devanbu, M. Gertz, C. Martel, and S. Stubblebine, "Authentic Third-Party Data Publication," Proc. IFIP WG11.3 Working Conf. Database and Application Security (DBSec '00), Aug. 2000.
[22] F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin, "Dynamic Authenticated Index Structures for Outsourced Databases," Proc. ACM Int'l Conf. Management of Data (SIGMOD '06), June 2006.
[23] V. Vu, S. Setty, A.J. Blumberg, and M. Walfish, "A Hybrid Architecture for Interactive Verifiable Computation," Proc. IEEE Symp. Security and Privacy (SP '13), May 2013.
[24] C. Wang, K. Ren, and J. Wang, "Secure and Practical Outsourcing of Linear Programming in Cloud Computing," Proc. INFOCOM, Apr. 2011.
[25] M.J. Atallah and K.B. Frikken, "Securely Outsourcing Linear Algebra Computations," Proc. Fifth ACM Symp. Information, Computer and Comm. Security (ASIACCS '10), Apr. 2010.
[26] Z. Xu, C. Wang, Q. Wang, K. Ren, and L. Wang, "Proof-Carrying Cloud Computation: The Case of Convex Optimization," Proc. INFOCOM, Apr. 2013.
[27] R. Jhawar, V. Piuri, and P. Samarati, "Supporting Security Requirements for Resource Management in Cloud Computing," Proc. 15th IEEE Int'l Conf. Computational Science and Eng., Dec. 2012.
[28] E. Damiani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, and P. Samarati, "Key Management for Multiuser Encrypted Databases," Proc. Int'l Workshop Storage Security and Survivability, Nov. 2005.
[29] S. De Capitani di Vimercati, S. Foresti, S. Jajodia, and G. Livraga, "Enforcing Subscription-Based Authorization Policies in Cloud Scenarios," Proc. IFIP WG11.3 Working Conf. Data and Application Security and Privacy, July 2012.
[30] S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, G. Pelosi, and P. Samarati, "Encryption-Based Policy Enforcement for CloudStorage," Proc. First Workshop Security and Privacy in Cloud Computing, June 2010.
78 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool