• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Analysis and optimization on flexdpdp: A practical solution for dynamic provable data possession (2014)

by E Esiner, A Küpçü, O ¨Ozkasap
Add To MetaCart

Tools

Sorted by:
Results 1 - 1 of 1

Database Outsourcing with Hierarchical Authenticated Data Structures

by Mohammad Etemad
"... Abstract. In an outsourced database scheme, the data owner delegates the data management tasks to a remote service provider. At a later time, the remote service is supposed to answer any query on the database. The essential requirements are ensuring the data integrity and authen-ticity with efficien ..."
Abstract - Add to MetaCart
Abstract. In an outsourced database scheme, the data owner delegates the data management tasks to a remote service provider. At a later time, the remote service is supposed to answer any query on the database. The essential requirements are ensuring the data integrity and authen-ticity with efficient mechanisms. Current approaches employ authenti-cated data structures to store security information, generated by the client and used by the server, to compute proofs that show the answers to the queries are authentic. The existing solutions have shortcomings with multi-clause queries and duplicate values in a column. We propose a hierarchical authenticated data structure for storing se-curity information, which alleviates the mentioned problems. We pro-vide a unified formal definition of a secure outsourced database scheme, and prove that our proposed scheme is secure according to this defini-tion, which captures previously separate properties such as correctness, completeness, and freshness. The performance evaluation based on our prototype implementation confirms the efficiency of the proposed out-sourced database scheme, showing more than 50 % decrease in proof size and proof generation time compared to previous work, and about 1-20% communication overhead compared to the query result size. 1
(Show Context)

Citation Context

...cess the whole lower-level ADS storing 100 values). This results in great performance improvements regarding both communication and computation. We use multi-proof supporting ADSs (e.g., the FlexList =-=[11]-=-) to construct the HADSs, which in turn, makes efficient authenticated range queries possible. A multi-proof supporting ADS generates an efficient (non-)membership proof for a set of values, instead o...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University