A Scheme for Verifying the Integrity of Outsourced Data
Unauthorized tampering with outsourced data can result in significant losses for both data owner and users.Data integrity therefore becomes an important factor in outsourced data systems.In this paper,we address this problem and propose a scheme for verifying the integrity of outsourced data.We firs...
Saved in:
Published in: | China communications Vol. 12; no. 11; pp. 188 - 195 |
---|---|
Main Authors: | , , , , |
Format: | Journal Article |
Language: | English |
Published: |
China Institute of Communications
01-11-2015
Department of Computer Science, Jinan University, Guangzhou China, 510632 |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | Unauthorized tampering with outsourced data can result in significant losses for both data owner and users.Data integrity therefore becomes an important factor in outsourced data systems.In this paper,we address this problem and propose a scheme for verifying the integrity of outsourced data.We first propose a new authenticated data structure for authenticating membership queries in sets based on accumulators,and then show how to apply it to the problem of verifying the integrity of outsourced data.We also prove that our scheme is secure under the q-strong DiffieHellman assumption.More importantly,our scheme has the constant cost communication,meanwhile keeping other complexity measures constant.Compared to previous schemes based on accumulators,our scheme reduces update cost and so improves previous schemes based on accumulators.In addition,the experimental comparison shows that our scheme outperforms the previous schemes. |
---|---|
AbstractList | Unauthorized tampering with outsourced data can result in significant losses for both data owner and users. Data integrity therefore becomes an important factor in outsourced data systems. In this paper, we address this problem and propose a scheme for verifying the integrity of outsourced data. We first propose a new authenticated data structure for authenticating membership queries in sets based on accumulators, and then show how to apply it to the problem of verifying the integrity of outsourced data. We also prove that our scheme is secure under the q-strong Diffie- Hellman assumption. More importantly, our scheme has the constant cost communication, meanwhile keeping other complexity measures constant. Compared to previous schemes based on accumulators, our scheme reduces update cost and so improves previous schemes based on accumulators. In addition, the experimental comparison shows that our scheme outperforms the previous schemes. Unauthorized tampering with outsourced data can result in significant losses for both data owner and users.Data integrity therefore becomes an important factor in outsourced data systems.In this paper,we address this problem and propose a scheme for verifying the integrity of outsourced data.We first propose a new authenticated data structure for authenticating membership queries in sets based on accumulators,and then show how to apply it to the problem of verifying the integrity of outsourced data.We also prove that our scheme is secure under the q-strong DiffieHellman assumption.More importantly,our scheme has the constant cost communication,meanwhile keeping other complexity measures constant.Compared to previous schemes based on accumulators,our scheme reduces update cost and so improves previous schemes based on accumulators.In addition,the experimental comparison shows that our scheme outperforms the previous schemes. |
Author | WANG Xiaoming YU Fang LIN Yanchun GAN Qingqing WU Daini |
AuthorAffiliation | Department of Computer Science, Jinan University, Guangzhou China, 510632 |
AuthorAffiliation_xml | – name: Department of Computer Science, Jinan University, Guangzhou China, 510632 |
Author_xml | – sequence: 1 givenname: Wang surname: Xiaoming fullname: Xiaoming, Wang organization: Department of Computer Science, Jinan University, Guangzhou China, 510632 – sequence: 2 givenname: Yu surname: Fang fullname: Fang, Yu email: yufangh4@jnu.edu.cn organization: Department of Computer Science, Jinan University, Guangzhou China, 510632 – sequence: 3 givenname: Lin surname: Yanchun fullname: Yanchun, Lin organization: Department of Computer Science, Jinan University, Guangzhou China, 510632 – sequence: 4 givenname: Gan surname: Qingqing fullname: Qingqing, Gan organization: Department of Computer Science, Jinan University, Guangzhou China, 510632 – sequence: 5 givenname: Wu surname: Daini fullname: Daini, Wu organization: Department of Computer Science, Jinan University, Guangzhou China, 510632 |
BookMark | eNpFkLtvwjAQxj1QqbRl7tDFqtQx4LMd2xlR-kJCYuhjtYxzCUHFaZ2glv71DQLRW-6k-93j-y7IIDQBCbkGNgZg2STPx5xBOtZCKS5hQIagtEhSKfU5GbXtmvVhlBKKD4me0he_wg3Sson0HWNd7upQ0W6FdBY6rGLd7WhT0sW2a5tt9FjQe9e5K3JWuo8WR8d8Sd4eH17z52S-eJrl03niBZgu0ViY1GfMm6V0y5QvdVYAMgayyDxniFJwNACi4Ez1JULhQToulS64EEZckrvD3m8XShcqu-6fCP1F-1t1P3udvWbYc5MD52PTthFL-xnrjYs7C8zubbF5bve4PdrST9wcJmpEPNH_3dvjvlUTqq_ekhOilDKZZoaJP-KhanQ |
CODEN | CCHOBE |
CitedBy_id | crossref_primary_10_1016_j_comcom_2023_02_005 |
ContentType | Journal Article |
Copyright | Copyright © Wanfang Data Co. Ltd. All Rights Reserved. |
Copyright_xml | – notice: Copyright © Wanfang Data Co. Ltd. All Rights Reserved. |
DBID | 2RA 92L CQIGP W92 ~WA 97E RIA RIE AAYXX CITATION 2B. 4A8 92I 93N PSX TCJ |
DOI | 10.1109/CC.2015.7366241 |
DatabaseName | 维普_期刊 中文科技期刊数据库-CALIS站点 维普中文期刊数据库 中文科技期刊数据库-工程技术 中文科技期刊数据库- 镜像站点 IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library Online CrossRef Wanfang Data Journals - Hong Kong WANFANG Data Centre Wanfang Data Journals 万方数据期刊 - 香港版 China Online Journals (COJ) China Online Journals (COJ) |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Economics |
EndPage | 195 |
ExternalDocumentID | zgtx201511018 10_1109_CC_2015_7366241 7366241 666897080 |
Genre | orig-research |
GrantInformation_xml | – fundername: This work was supported in part by National Natural Science Foundation of China under Grant; Natural Science Foundation of Guangdong Province, China under Grant (S2012010008767).Science and Technology Planning Project of Guangdong Province, China under Grant funderid: (61070164,61272415); (2013B010401015) |
GroupedDBID | 0R~ 29B 2B. 2C0 2RA 4.4 5GY 6IK 92H 92I 92L 92R 93N 97E AAHTB AAJGR AASAJ ABPEJ AENEX AKJIK ALMA_UNASSIGNED_HOLDINGS ATWAV AZLTO BEFXN BFFAM BGNUA BKEBE BPEOZ CQIGP EBS EJD HZ~ IFIPE IPLJI JAVBF M43 O9- OCL RIA RIE RIG RNS TCJ TGT U1G U5S U5T W92 ~WA -SI -SJ -S~ AAXDM ABQJQ CAJEI CAJEJ Q-- Q-9 AAYXX CITATION 4A8 PSX |
ID | FETCH-LOGICAL-c318t-7ed85c90c8b4ab52b79d1e0014d9c20ee432e8113d20632ee1dc14a2467d23383 |
IEDL.DBID | RIE |
ISSN | 1673-5447 |
IngestDate | Wed Nov 06 04:28:43 EST 2024 Fri Aug 23 04:05:12 EDT 2024 Mon Nov 04 12:08:55 EST 2024 Wed Feb 14 10:25:02 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 11 |
Keywords | data integrity constant complexity authenticated data structure outsourced data |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c318t-7ed85c90c8b4ab52b79d1e0014d9c20ee432e8113d20632ee1dc14a2467d23383 |
Notes | 11-5439/TN |
PageCount | 8 |
ParticipantIDs | ieee_primary_7366241 wanfang_journals_zgtx201511018 crossref_primary_10_1109_CC_2015_7366241 chongqing_primary_666897080 |
PublicationCentury | 2000 |
PublicationDate | 2015-11-01 |
PublicationDateYYYYMMDD | 2015-11-01 |
PublicationDate_xml | – month: 11 year: 2015 text: 2015-11-01 day: 01 |
PublicationDecade | 2010 |
PublicationTitle | China communications |
PublicationTitleAbbrev | ChinaComm |
PublicationTitleAlternate | China Communications |
PublicationTitle_FL | China Communications |
PublicationYear | 2015 |
Publisher | China Institute of Communications Department of Computer Science, Jinan University, Guangzhou China, 510632 |
Publisher_xml | – name: China Institute of Communications – name: Department of Computer Science, Jinan University, Guangzhou China, 510632 |
SSID | ssj0000866362 |
Score | 2.027007 |
Snippet | Unauthorized tampering with outsourced data can result in significant losses for both data owner and users.Data integrity therefore becomes an important factor... Unauthorized tampering with outsourced data can result in significant losses for both data owner and users. Data integrity therefore becomes an important... |
SourceID | wanfang crossref ieee chongqing |
SourceType | Aggregation Database Publisher |
StartPage | 188 |
SubjectTerms | authenticated complexity Complexity theory constant Cryptography data Data structures datastructure Generators integrity outsourced Resistance Servers |
Title | A Scheme for Verifying the Integrity of Outsourced Data |
URI | http://lib.cqvip.com/qk/89450X/201511/666897080.html https://ieeexplore.ieee.org/document/7366241 https://d.wanfangdata.com.cn/periodical/zgtx201511018 |
Volume | 12 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwELVoF1j4KohSqDwwMJA2dhLbGavQqhMLILFFiX0pDCRAGwnx6zk7aQQSC1vk2FF0_rh3Z79nQq40evE8A-EVRgVeyArt5VpEnkBoHYa50FFhc7rLe3n3pG7nVibnpuPCAIA7fAYT--j28k2la5sqm8pACG5Z6j0Zq4ar1eVTEJqLwN0fyoS0-_2hbJV8mB9Pk8Se4oom7ReskMJzVa7e0T38ckjuhhXH3ymLrFz9cDWLg__95CHZbyElnTVj4IjsQHlMdreM4_WAyBnFGBZegSJCpTh2Xxy5iSL2o41cBEJxWhW0qjdNMt9Qe3L0hDwu5g_J0msvTPA0Ts2NJ8GoSMe-VnmY5RHPZWwY2CjIxJr7AGHAQTEWGI7IhAMwo1mYcVwsDbex6inpl1UJZ4QGJs9MADEGgCpER6rAKZVpXzNcEPNiSEadBdO3RhgjxVBIxRIx6JBcb23avXTRhh-nSZLarkhbOw3JwNqwq9YVj9s-SNtJtU6_VptP25RZlbHzv9uNyJ6t0rAFL0h_81HDJemtTT124-UbwiW7mQ |
link.rule.ids | 315,782,786,798,27933,27934,54767 |
linkProvider | IEEE |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELagDGXhVRDlUTwwMJASO46djCi0KuKxABJblNiXwkACtJUQv56zEyKQWNgix46i8-O-O_v7TMixRi-eZyC9wkSBJ1ihvVzL0JMIrYXIpQ4Lm9Od3Knbx-hiZGVyTlsuDAC4w2cwtI9uL99UemFTZWcqkJJblvpKKJRUNVurzaggOJeBu0GUSWV3_IVqtHyYH58liT3HFQ6bb1gphaeqnL6hg_jlktwdK47BUxZZOf3hbMbr__vNDbLWgEp6Xo-CTbIE5RbpfnOOZz2izilGsfACFDEqxdH77OhNFNEfrQUjEIzTqqDVYl6n8w21Z0e3ycN4dJ9MvObKBE_j5Jx7CkwU6tjXUS6yPOS5ig0DGweZWHMfQAQcIsYCwxGbcABmNBMZx-XScBut7pBOWZWwS2hg8swEEGMIGAl0pRE4rTLta4ZLYl70yX5rwfS1lsZIMRiKYoUotE9Ovm3avnTxhh-nSZLarkgbO_VJz9qwrdYWD5o-SJtpNUs_p_MP25RZnbG9v9sdke7k_uY6vb68vdonq7Z6zR08IJ35-wIOyfLMLAZu7HwB0Ye-6g |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+scheme+for+verifying+the+integrity+of+outsourced+data&rft.jtitle=China+communications&rft.au=Xiaoming%2C+Wang&rft.au=Fang%2C+Yu&rft.au=Yanchun%2C+Lin&rft.au=Qingqing%2C+Gan&rft.date=2015-11-01&rft.pub=China+Institute+of+Communications&rft.issn=1673-5447&rft.volume=12&rft.issue=11&rft.spage=1&rft.epage=8&rft_id=info:doi/10.1109%2FCC.2015.7366241&rft.externalDocID=7366241 |
thumbnail_s | http://sdu.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F89450X%2F89450X.jpg http://sdu.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fwww.wanfangdata.com.cn%2Fimages%2FPeriodicalImages%2Fzgtx%2Fzgtx.jpg |