Filters








1,107 Hits in 3.2 sec

Super-Efficient Verification of Dynamic Outsourced Databases [chapter]

Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos
Lecture Notes in Computer Science  
We develop new algorithmic and cryptographic techniques for authenticating the results of queries over databases that are outsourced to an untrusted responder.  ...  Our techniques allow for efficient updates of the database and protect against replay attacks performed by the responder.  ...  Thus, an important component of any outsourced database system is the security of its answer-verification process.  ... 
doi:10.1007/978-3-540-79263-5_26 fatcat:i4gmdlkjwvcvvdbmgg2x5cgf4u

Certification and Authentication of Data Structures

Roberto Tamassia, Nikos Triandopoulos
2010 Alberto Mendelzon Workshop on Foundations of Data Management  
Our framework efficiently reduces the authentication of general queries to that of set-membership queries, and provides sufficient conditions for achieving super-efficient answer verification (in time  ...  We study the design of secure protocols for efficiently verifying the results of queries on data structures that are outsourced to untrusted servers, where answers are processed over relational databases  ...  of the search algorithm, which leads to a framework for the design of authentication structures with super-efficient verification.  ... 
dblp:conf/amw/TamassiaT10 fatcat:ooqds6ojurhkzcvjifvgrzfo4a

A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing

Simin Ghasemi, Mohammad Ali Hadavi, Mina Niknafs
2019 Isecure  
Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios.  ...  imposed on clients in database outsourcing scenarios.  ...  Triandopoulos, "Super-efficient verification of dynamic outsourced databases," Top. Cryptology-CT-RSA 2008, pp. 407-424, 2008. [2] R.  ... 
doi:10.22042/isecure.2018.141655.426 dblp:journals/isecure/GhasemiHN19 fatcat:wj3i5a4q6vc7xp4nbil7toiffa

Capacity Management for Virtualized Data Centers using ECIES and Scheduling

Anil KumarRaghuwanshi, Kavita Burse
2014 International Journal of Computer Applications  
The proposed technique provides much efficient use of Virtualized data as compared to the existing technique.  ...  Here in this paper an efficient Capacity Management of user"s data on datacenters is proposed using attribute and scheduling techniques.  ...  Architecture of cloud database storage is used to avoid the local administrator. Additionally Ulrich Greveler et al [10] studied about the cloud administrator and outsourced database content.  ... 
doi:10.5120/18112-9283 fatcat:st6226iggbgbnhqw6uoslkiszm

Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud

Jun Hong, Tao Wen, Quan Guo, Zhengwang Ye
2017 Mathematical Problems in Engineering  
Furthermore, the similarity search tree is extended to build a novel verifiable SS-tree that supports efficient kNN query and kNN query verification.  ...  Data privacy and query integrity are perceived as two major factors obstructing enterprises from outsourcing their databases.  ...  Acknowledgments This research is supported by the National Nature Science Foundation of China (nos. 61772101, 61170169, 61170168, and 61602075).  ... 
doi:10.1155/2017/8109730 fatcat:jg24dtvfnjcjdltxw7momuxh3m

Markle Hellman Knapsack Crypto-System Auditing Scheme for Privacy Preserving in Cloud Storage

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
In order to address this issue, this paper presents an efficient security with an auditing scheme that guarantees the security of the data and preserve data integrity.  ...  However, the data owners' concern about the security of the data.  ...  [16] presented an efficient auditing mechanism namely dynamically Adjustable-capacity Cuckoo Filter (DACF) for privacy preserving outsourced database without the aid of TPA.  ... 
doi:10.35940/ijitee.l2794.1081219 fatcat:o53xspt6hvcx3goymmstwpsjqu

A Comprehensive Analysis On Efficient Multimedia Storage Mechanism In Public Cloud Environment With Secured Access

G. Megala, Et. al.
2021 Turkish Journal of Computer and Mathematics Education  
Dynamic on-demand service has become the crucial part in cloud computing according to the user's requirements.  ...  The limitations in the existing is also provided and hence outlined the research direction towards an efficient storage mechanism with a secured access providing a reliable media data transmission between  ...  Declaration of Competing Interest The authors declare that they have no known competing financial interests or personal relationships which have or could be perceived to have influenced the work reported  ... 
doi:10.17762/turcomat.v12i5.1794 fatcat:v37hz23khbhzlnz7tccy2sfsly

Efficient verification of web-content searching through authenticated web crawlers

Michael T. Goodrich, Charalampos Papamanthou, Duy Nguyen, Roberto Tamassia, Cristina Videira Lopes, Olga Ohrimenko, Nikos Triandopoulos
2012 Proceedings of the VLDB Endowment  
This signature enables (i) the verification of common Internet queries on web pages, such as conjunctive keyword searches-this guarantees that the output of a conjunctive keyword search is correct and  ...  complete; (ii) the verification of the content returned by such Internet queries-this guarantees that web data is authentic and has not been maliciously altered since the computation of the signature by  ...  , and that super-efficient answer verification (where the verification of an answer is asymptotically faster than the answer computation) for many interesting problems is possible.  ... 
doi:10.14778/2336664.2336666 fatcat:xqss7qox75c3fgmvez4wfxwv2u

Verifying Search Results Over Web Collections [article]

Michael T. Goodrich, Duy Nguyen, Olga Ohrimenko, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos, Cristina Videira Lopes
2012 arXiv   pre-print
Searching accounts for one of the most frequently performed computations over the Internet as well as one of the most important applications of outsourced computing, producing results that critically affect  ...  This signature also allows the verification of complicated queries on web pages, such as conjunctive keyword searches.  ...  , and that super-efficient answer verification (where the verification of an answer is asymptotically faster than the answer computation) for many interesting problems is possible.  ... 
arXiv:1204.5446v2 fatcat:5osligxudfagxlsnst6uze64iu

Database Outsourcing with Hierarchical Authenticated Data Structures [chapter]

Mohammad Etemad, Alptekin Küpçü
2014 Lecture Notes in Computer Science  
Goodrich et al. [15] gave a super-efficient answer verification method by decoupling the authentication structure from the search data structure.  ...  Our solution handles many different types of queries, including multi-clause selection and join queries, in a dynamic database.  ...  Outsourced Database Scheme Model The outsourced database (ODB) model, as depicted in Figure 5 , is composed of three parties: the data owner, the querier, and the service provider.  ... 
doi:10.1007/978-3-319-12160-4_23 fatcat:navwxltavnbg3k4wxovo3bai3a

"Survey on Morse Code for High Level Security for Cloud Storage"

Rutuja Kadam, Gayatri Narayankar
2018 IJARCCE  
Cloud computing provides us cheaper, faster, flexible, efficient environment. Cloud computing provides multitudinous benefits to both service provider and customer.  ...  Furthermore, the proposed scheme is implemented and the accuracy of encryption and decryption of data is verified.  ...  "[3] This paper describes an efficient data encryption and data decryption algorithm to protect the outsourced sensitive data in cloud computing environment.  ... 
doi:10.17148/ijarcce.2018.71214 fatcat:6n6bkqfprfcxdflxss2szh4h4u

Optimal Verification of Operations on Dynamic Sets [chapter]

Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos
2011 Lecture Notes in Computer Science  
We study the design of protocols for set-operation verification, namely the problem of cryptographically checking the correctness of outsourced set operations performed by an untrusted server over a dynamic  ...  In contrast, existing schemes entail high communication and verification costs or high storage costs. Applications of interest include efficient verification of keyword search and database queries.  ...  The views in this paper do not necessarily reflect the views of the sponsors.  ... 
doi:10.1007/978-3-642-22792-9_6 fatcat:m5qm2fo3xva7bh5etqttyf5bm4

Publicly verifiable grouped aggregation queries on outsourced data streams

S. Nath, R. Venkatesan
2013 2013 IEEE 29th International Conference on Data Engineering (ICDE)  
However, data outsourcing and remote computations intrinsically raise issues of trust, making it crucial to verify results returned by third parties.  ...  Untrusted clients then query the server for results and efficiently verify correctness of the results by using a small and easy-to-compute signature provided by the data owner.  ...  [29] give a powerful interactive protocol that achieves a polynomial time prover and super-efficient verifier for a large class of problems.  ... 
doi:10.1109/icde.2013.6544852 dblp:conf/icde/NathV13 fatcat:qhlefu4x6nbxfhawzijfzsyb5u

Deduplication Supporting Strong Privacy Protection for Cloud Storage

K. Makanyadevi, Et. al.
2021 Turkish Journal of Computer and Mathematics Education  
The TPA methodically analyzes the prove of compliance with set up security criteria within the connection between the CC and the Cloud Benefit Supplier (CSP).  ...  Consequently, including reviewers comes with its issues such as belief and preparing overhead To achieve productive examining, we ought to (1) fulfill efficiently auditing without asking the information  ...  It is likewise the house of software programs and databases which are accessible, on-demand.  ... 
doi:10.17762/turcomat.v12i2.1981 fatcat:ssat254shbe2lmnk2uukr4r4vq

Detection and Prevention of Insider Threats in Database Driven Web Services [chapter]

Tzvi Chumash, Danfeng Yao
2009 IFIP Advances in Information and Communication Technology  
We also describe our implementation of SafeWS and its evaluation. The performance analysis of our prototype shows the overhead introduced by security verification is small.  ...  SafeWS will allow business owners to significantly reduce the security risks and vulnerabilities of outsourcing their sensitive customer data to third-party providers.  ...  The authors would like to dedicate this paper in memory of Denitsa Tilkidjieva. A dear friend and a bright third-year Ph.D. student at the Computer Science department in Rutgers.  ... 
doi:10.1007/978-3-642-02056-8_8 fatcat:652babzu6neudffhmbthysomue
« Previous Showing results 1 — 15 out of 1,107 results