A Reliable Query Scheme for Outsourced Data in Cloud

作者: Junchao Wu , Panpan Li , Hongli Zhang , Binsheng Chu

DOI: 10.1007/978-3-642-35795-4_92

关键词:

摘要: Cloud computing allows data owner to outsource its whole information infrastructure cloud service provider (CSP).Authorized users can search the they want through cloud. However malicious CSP may not execute users’ query but returns that there is no result matches condition for economic benefit .In this paper, we propose a mechanism solve problem in owner-write-user-read applications. We add redundant generated by hash function original data. When adding query, cannot return empty because of must exist Through adoption key derivation method, needs maintain only few seeds. Analysis shows procedure using owner’s and will introduce limited storage overhead.

参考文章(13)
Stefano Paraboschi, Sara Foresti, Sabrina De Capitani di Vimercati, Sushil Jajodia, Pierangela Samarati, Over-encryption: management of access control evolution on outsourced data very large data bases. pp. 123- 134 ,(2007)
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou, Enabling public verifiability and data dynamics for storage security in cloud computing european symposium on research in computer security. pp. 355- 370 ,(2009) , 10.1007/978-3-642-04444-1_22
Hong-Linh Truong, Schahram Dustdar, On analyzing and specifying concerns for data as a service asia-pacific services computing conference. pp. 87- 94 ,(2009) , 10.1109/APSCC.2009.5394136
Yang Ming, Liu Fan, Han Jing-Li, Wang Zhao-Li, An Efficient Attribute Based Encryption Scheme with Revocation for Outsourced Data Sharing Control international conference on instrumentation and measurement, computer, communication and control. pp. 516- 520 ,(2011) , 10.1109/IMCCC.2011.134
Alberto Ceselli, Ernesto Damiani, Sabrina De Capitani Di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, None, Modeling and assessing inference exposure in encrypted databases ACM Transactions on Information and System Security. ,vol. 8, pp. 119- 152 ,(2005) , 10.1145/1053283.1053289
Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, Dawn Song, Provable data possession at untrusted stores computer and communications security. pp. 598- 609 ,(2007) , 10.1145/1315245.1315318
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou, Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing international conference on computer communications. pp. 534- 542 ,(2010) , 10.1109/INFCOM.2010.5462174
Marina Blanton, Nelly Fazio, KB Frikken, Dynamic and efficient key management for access hierarchies Proceedings of the 12th ACM conference on Computer and communications security - CCS '05. pp. 190- 202 ,(2005) , 10.1145/1102120.1102147
Cong Wang, Qian Wang, Kui Ren, Wenjing Lou, Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing international conference on computer communications. pp. 525- 533 ,(2010) , 10.1109/INFCOM.2010.5462173
Ram Swaminathan, Mehul A. Shah, Mary Baker, Privacy-Preserving Audit and Extraction of Digital Contents IACR Cryptology ePrint Archive. ,vol. 2008, pp. 186- ,(2008)