AUTHENTICATION OF ENCRYPTED OUTSOURCED DATABASE BASED ON BATCH VERIFICATION | Giàu | TNU Journal of Science and Technology

AUTHENTICATION OF ENCRYPTED OUTSOURCED DATABASE BASED ON BATCH VERIFICATION

About this article

Received: 11/06/19                Revised: 06/08/19                Published: 28/08/19

Authors

1. Ho Kim Giau Email to author, Le Quy Don Technical University
2. Nguyen Hieu Minh, Academy Of Cryptography Techniques

Abstract


When outsourcing data, the Data owner gives full authority of his database to the service provider. However, the service provider may not guarantee the safety of the owner’s data. In addition, attackers on the network environment can steal and change data. To protect own database, Data owner often encrypts data before storing it on the service provider’s server. From there, it is required to ensure the integrity and authenticity of the data when querying the encrypted database.
In this paper, we present data integrity issues and propose authentication models when querying an outsourced encrypted database. We propose a batch verification scheme, apply it to verify data and evaluate the computation complexity of the algorithm.


Keywords


Outsourced database; encrypted database; authentication; batch verification

References


[1]. Y. Zhang, J. Katz, and C. Papamanthou, “Integridb: Verifiable SQL for outsourced databases,” in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 2015, pp. 1480–1491.

[2]. M. S. Niaz and G. Saake, “Merkle Hash Tree based Techniques for Data Integrity of Outsourced Data.” in GvD, 2015, pp. 66–71.

[3]. R. Jain and S. Prabhakar, “Trustworthy data from untrusted databases,” in Data Engineering (ICDE), 2013 IEEE 29th International Conference on. IEEE, 2013, pp. 529–540.

[4]. E. Mykletun, M. Narasimha, and G. Tsudik, “Authentication and integrity in outsourced databases,” ACM Transactions on Storage (TOS), vol. 2, no. 2, pp. 107–138, 2006.

[5]. J. Yuan and S. Yu, “Flexible and publicly verifiable aggregation query for outsourced databases in cloud,” in Communications and network security (cns), 2013 ieee conference on. IEEE, 2013, pp.520–524.

[6]. P. FIPS, “186,” Digital Signature Standard, vol. 1, 1994.

[7]. R. GOST, “R 34.10-94. Russian Federation Standard,” Information Technology. Cryptographic data Security. Produce and check procedures of Electronic Digital Signature based on Asymmetric Cryptographic Algorithm. Government Committee of the Russia for Standards, 1994.

[8]. C. H. Lim and P. J. Lee, “A study on the proposed Korean digital signature algorithm,” in International Conference on the Theory and Application of Cryptology and Information Security. Springer, 1998, pp. 175–186.

[9]. C.-P. Schnorr, “Efficient identification and signatures for smart cards,” in Conference on the Theory and Application of Cryptology. Springer, 1989, pp. 239–252.

[10]. H. Morita, J. C. Schuldt, T. Matsuda, G. Hanaoka, and T. Iwata, “On the security of the schnorr signature scheme and DSA against related-key attacks,” in International Conference on Information Security and Cryptology. Springer, 2015, pp. 20–35.

[11]. L. Harn, “Batch verifying multiple DSA-type digital signatures,” Electronics Letters, vol. 34, no. 9, pp. 870–871, 1998.

[12]. D. Naccache, D. M’Ra¨Ihi, S. Vaudenay, and D. Raphaeli, “Can DSA be improved?—Complexity trade-offs with the digital signature standard—,” in Workshop on the Theory and Application of of Cryptographic Techniques. Springer, 1994, pp. 77–85.

[13]. C. H. Lim and P. J. Lee, “Security of interactive DSA batch verification,” Electronics letters, vol. 30, no. 19, pp. 1592–1593, 1994.

[14]. S.-M. Yen and C.-S. Laih, “Improved digital signature suitable for batch verification,” IEEE Transactions on Computers, vol. 44, no. 7, pp. 957–959, 1995.

[15]. C. Boyd and C. Pavlovski, “Attacking and repairing batch verification schemes,” in International Conference on the Theory and Application of Cryptology and Information Security. Springer, 2000, pp. 58–71.

[16]. M. Bellare, J. A. Garay, and T. Rabin, “Fast batch verification for modular exponentiation and digital signatures,” in International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 1998, pp. 236–250.

[17]. Y. Zhou, X. Zhu, and Y. Fang, “MABS: Multicast authentication based on batch signature,” IEEE transactions on Mobile Computing, vol. 9, no. 7, pp. 982–993, 2010.

[18]. Z. Shao, “Batch verifying multiple DSA-type digital signatures,” Computer Networks, vol. 37, no. 3-4, pp. 383–389, 2001.

[19]. J. Katz, A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone, Handbook of applied cryptography. CRC press, 1996.


Refbacks

  • There are currently no refbacks.
TNU Journal of Science and Technology
Rooms 408, 409 - Administration Building - Thai Nguyen University
Tan Thinh Ward - Thai Nguyen City
Phone: (+84) 208 3840 288 - E-mail: jst@tnu.edu.vn
Based on Open Journal Systems
©2018 All Rights Reserved