A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Filters
Super-Efficient Verification of Dynamic Outsourced Databases
[chapter]
Lecture Notes in Computer Science
We develop new algorithmic and cryptographic techniques for authenticating the results of queries over databases that are outsourced to an untrusted responder. ...
Our techniques allow for efficient updates of the database and protect against replay attacks performed by the responder. ...
Thus, an important component of any outsourced database system is the security of its answer-verification process. ...
doi:10.1007/978-3-540-79263-5_26
fatcat:i4gmdlkjwvcvvdbmgg2x5cgf4u
Certification and Authentication of Data Structures
2010
Alberto Mendelzon Workshop on Foundations of Data Management
Our framework efficiently reduces the authentication of general queries to that of set-membership queries, and provides sufficient conditions for achieving super-efficient answer verification (in time ...
We study the design of secure protocols for efficiently verifying the results of queries on data structures that are outsourced to untrusted servers, where answers are processed over relational databases ...
of the search algorithm, which leads to a framework for the design of authentication structures with super-efficient verification. ...
dblp:conf/amw/TamassiaT10
fatcat:ooqds6ojurhkzcvjifvgrzfo4a
A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing
2019
Isecure
Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios. ...
imposed on clients in database outsourcing scenarios. ...
Triandopoulos, "Super-efficient verification of dynamic outsourced databases," Top. Cryptology-CT-RSA 2008, pp. 407-424, 2008. [2] R. ...
doi:10.22042/isecure.2018.141655.426
dblp:journals/isecure/GhasemiHN19
fatcat:wj3i5a4q6vc7xp4nbil7toiffa
Capacity Management for Virtualized Data Centers using ECIES and Scheduling
2014
International Journal of Computer Applications
The proposed technique provides much efficient use of Virtualized data as compared to the existing technique. ...
Here in this paper an efficient Capacity Management of user"s data on datacenters is proposed using attribute and scheduling techniques. ...
Architecture of cloud database storage is used to avoid the local administrator. Additionally Ulrich Greveler et al [10] studied about the cloud administrator and outsourced database content. ...
doi:10.5120/18112-9283
fatcat:st6226iggbgbnhqw6uoslkiszm
Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud
2017
Mathematical Problems in Engineering
Furthermore, the similarity search tree is extended to build a novel verifiable SS-tree that supports efficient kNN query and kNN query verification. ...
Data privacy and query integrity are perceived as two major factors obstructing enterprises from outsourcing their databases. ...
Acknowledgments This research is supported by the National Nature Science Foundation of China (nos. 61772101, 61170169, 61170168, and 61602075). ...
doi:10.1155/2017/8109730
fatcat:jg24dtvfnjcjdltxw7momuxh3m
Markle Hellman Knapsack Crypto-System Auditing Scheme for Privacy Preserving in Cloud Storage
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
In order to address this issue, this paper presents an efficient security with an auditing scheme that guarantees the security of the data and preserve data integrity. ...
However, the data owners' concern about the security of the data. ...
[16] presented an efficient auditing mechanism namely dynamically Adjustable-capacity Cuckoo Filter (DACF) for privacy preserving outsourced database without the aid of TPA. ...
doi:10.35940/ijitee.l2794.1081219
fatcat:o53xspt6hvcx3goymmstwpsjqu
A Comprehensive Analysis On Efficient Multimedia Storage Mechanism In Public Cloud Environment With Secured Access
2021
Turkish Journal of Computer and Mathematics Education
Dynamic on-demand service has become the crucial part in cloud computing according to the user's requirements. ...
The limitations in the existing is also provided and hence outlined the research direction towards an efficient storage mechanism with a secured access providing a reliable media data transmission between ...
Declaration of Competing Interest The authors declare that they have no known competing financial interests or personal relationships which have or could be perceived to have influenced the work reported ...
doi:10.17762/turcomat.v12i5.1794
fatcat:v37hz23khbhzlnz7tccy2sfsly
Efficient verification of web-content searching through authenticated web crawlers
2012
Proceedings of the VLDB Endowment
This signature enables (i) the verification of common Internet queries on web pages, such as conjunctive keyword searches-this guarantees that the output of a conjunctive keyword search is correct and ...
complete; (ii) the verification of the content returned by such Internet queries-this guarantees that web data is authentic and has not been maliciously altered since the computation of the signature by ...
, and that super-efficient answer verification (where the verification of an answer is asymptotically faster than the answer computation) for many interesting problems is possible. ...
doi:10.14778/2336664.2336666
fatcat:xqss7qox75c3fgmvez4wfxwv2u
Verifying Search Results Over Web Collections
[article]
2012
arXiv
pre-print
Searching accounts for one of the most frequently performed computations over the Internet as well as one of the most important applications of outsourced computing, producing results that critically affect ...
This signature also allows the verification of complicated queries on web pages, such as conjunctive keyword searches. ...
, and that super-efficient answer verification (where the verification of an answer is asymptotically faster than the answer computation) for many interesting problems is possible. ...
arXiv:1204.5446v2
fatcat:5osligxudfagxlsnst6uze64iu
Database Outsourcing with Hierarchical Authenticated Data Structures
[chapter]
2014
Lecture Notes in Computer Science
Goodrich et al. [15] gave a super-efficient answer verification method by decoupling the authentication structure from the search data structure. ...
Our solution handles many different types of queries, including multi-clause selection and join queries, in a dynamic database. ...
Outsourced Database Scheme
Model The outsourced database (ODB) model, as depicted in Figure 5 , is composed of three parties: the data owner, the querier, and the service provider. ...
doi:10.1007/978-3-319-12160-4_23
fatcat:navwxltavnbg3k4wxovo3bai3a
"Survey on Morse Code for High Level Security for Cloud Storage"
2018
IJARCCE
Cloud computing provides us cheaper, faster, flexible, efficient environment. Cloud computing provides multitudinous benefits to both service provider and customer. ...
Furthermore, the proposed scheme is implemented and the accuracy of encryption and decryption of data is verified. ...
"[3] This paper describes an efficient data encryption and data decryption algorithm to protect the outsourced sensitive data in cloud computing environment. ...
doi:10.17148/ijarcce.2018.71214
fatcat:6n6bkqfprfcxdflxss2szh4h4u
Optimal Verification of Operations on Dynamic Sets
[chapter]
2011
Lecture Notes in Computer Science
We study the design of protocols for set-operation verification, namely the problem of cryptographically checking the correctness of outsourced set operations performed by an untrusted server over a dynamic ...
In contrast, existing schemes entail high communication and verification costs or high storage costs. Applications of interest include efficient verification of keyword search and database queries. ...
The views in this paper do not necessarily reflect the views of the sponsors. ...
doi:10.1007/978-3-642-22792-9_6
fatcat:m5qm2fo3xva7bh5etqttyf5bm4
Publicly verifiable grouped aggregation queries on outsourced data streams
2013
2013 IEEE 29th International Conference on Data Engineering (ICDE)
However, data outsourcing and remote computations intrinsically raise issues of trust, making it crucial to verify results returned by third parties. ...
Untrusted clients then query the server for results and efficiently verify correctness of the results by using a small and easy-to-compute signature provided by the data owner. ...
[29] give a powerful interactive protocol that achieves a polynomial time prover and super-efficient verifier for a large class of problems. ...
doi:10.1109/icde.2013.6544852
dblp:conf/icde/NathV13
fatcat:qhlefu4x6nbxfhawzijfzsyb5u
Deduplication Supporting Strong Privacy Protection for Cloud Storage
2021
Turkish Journal of Computer and Mathematics Education
The TPA methodically analyzes the prove of compliance with set up security criteria within the connection between the CC and the Cloud Benefit Supplier (CSP). ...
Consequently, including reviewers comes with its issues such as belief and preparing overhead To achieve productive examining, we ought to (1) fulfill efficiently auditing without asking the information ...
It is likewise the house of software programs and databases which are accessible, on-demand. ...
doi:10.17762/turcomat.v12i2.1981
fatcat:ssat254shbe2lmnk2uukr4r4vq
Detection and Prevention of Insider Threats in Database Driven Web Services
[chapter]
2009
IFIP Advances in Information and Communication Technology
We also describe our implementation of SafeWS and its evaluation. The performance analysis of our prototype shows the overhead introduced by security verification is small. ...
SafeWS will allow business owners to significantly reduce the security risks and vulnerabilities of outsourcing their sensitive customer data to third-party providers. ...
The authors would like to dedicate this paper in memory of Denitsa Tilkidjieva. A dear friend and a bright third-year Ph.D. student at the Computer Science department in Rutgers. ...
doi:10.1007/978-3-642-02056-8_8
fatcat:652babzu6neudffhmbthysomue
« Previous
Showing results 1 — 15 out of 1,107 results