Efficient detection of unauthorized data modification in cloud databases

作者: Luca Ferretti , Fabio Pierazzi , Michele Colajanni , Mirco Marchetti , Marcello Missiroli

DOI: 10.1109/ISCC.2014.6912574

关键词:

摘要: Cloud services represent an unprecedented opportunity, but their adoption is hindered by confidentiality and integrity issues related to the risks of outsourcing private data cloud providers. This paper focuses on proposes innovative solution that allows tenants detect unauthorized modifications outsourced while minimizing storage network overheads. Our approach based encrypted Bloom filters, designed allow efficient verification for databases stored in cloud. We assess effectiveness proposal as well its performance improvements with respect existing solutions evaluating costs.

参考文章(14)
Chan Yeob Yeun, Sameera Abdulrahman Almulla, Cloud computing security management 2010 Second International Conference on Engineering System Management and Applications. pp. 1- 7 ,(2010)
Bruce Schneier, Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) fast software encryption. pp. 191- 204 ,(1993) , 10.1007/3-540-58108-1_24
Stefano Paraboschi, Sara Foresti, Sabrina De Capitani di Vimercati, Sushil Jajodia, Pierangela Samarati, Over-encryption: management of access control evolution on outsourced data very large data bases. pp. 123- 134 ,(2007)
Luca Ferretti, Michele Colajanni, Mirco Marchetti, Access Control Enforcement on Query-Aware Encrypted Cloud Databases 2013 IEEE 5th International Conference on Cloud Computing Technology and Science. ,vol. 2, pp. 219- 219 ,(2013) , 10.1109/CLOUDCOM.2013.172
Andrei Broder, Michael Mitzenmacher, Network Applications of Bloom Filters: A Survey Internet Mathematics. ,vol. 1, pp. 485- 509 ,(2004) , 10.1080/15427951.2004.10129096
Luca Ferretti, Fabio Pierazzi, Michele Colajanni, Mirco Marchetti, Performance and cost evaluation of an adaptive encryption architecture for cloud databases ieee international conference on cloud computing technology and science. ,vol. 2, pp. 143- 155 ,(2014) , 10.1109/TCC.2014.2314644
Luca Ferretti, Michele Colajanni, Mirco Marchetti, Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases IEEE Transactions on Parallel and Distributed Systems. ,vol. 25, pp. 437- 446 ,(2014) , 10.1109/TPDS.2013.154
Einar Mykletun, Maithili Narasimha, Gene Tsudik, Authentication and integrity in outsourced databases ACM Transactions on Storage. ,vol. 2, pp. 107- 138 ,(2006) , 10.1145/1149976.1149977
Burton H. Bloom, Space/time trade-offs in hash coding with allowable errors Communications of the ACM. ,vol. 13, pp. 422- 426 ,(1970) , 10.1145/362686.362692
T. Aditya, P.K. Baruah, R. Mukkamala, Space-Efficient Bloom Filters for Enforcing Integrity of Outsourced Data in Cloud Environments 2011 IEEE 4th International Conference on Cloud Computing. pp. 292- 299 ,(2011) , 10.1109/CLOUD.2011.40