A Scheme for Verifying the Integrity of Outsourced Data

Unauthorized tampering with outsourced data can result in significant losses for both data owner and users.Data integrity therefore becomes an important factor in outsourced data systems.In this paper,we address this problem and propose a scheme for verifying the integrity of outsourced data.We firs...

Full description

Saved in:
Bibliographic Details
Published in:China communications Vol. 12; no. 11; pp. 188 - 195
Main Authors: Xiaoming, Wang, Fang, Yu, Yanchun, Lin, Qingqing, Gan, Daini, Wu
Format: Journal Article
Language:English
Published: China Institute of Communications 01-11-2015
Department of Computer Science, Jinan University, Guangzhou China, 510632
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Unauthorized tampering with outsourced data can result in significant losses for both data owner and users.Data integrity therefore becomes an important factor in outsourced data systems.In this paper,we address this problem and propose a scheme for verifying the integrity of outsourced data.We first propose a new authenticated data structure for authenticating membership queries in sets based on accumulators,and then show how to apply it to the problem of verifying the integrity of outsourced data.We also prove that our scheme is secure under the q-strong DiffieHellman assumption.More importantly,our scheme has the constant cost communication,meanwhile keeping other complexity measures constant.Compared to previous schemes based on accumulators,our scheme reduces update cost and so improves previous schemes based on accumulators.In addition,the experimental comparison shows that our scheme outperforms the previous schemes.
AbstractList Unauthorized tampering with outsourced data can result in significant losses for both data owner and users. Data integrity therefore becomes an important factor in outsourced data systems. In this paper, we address this problem and propose a scheme for verifying the integrity of outsourced data. We first propose a new authenticated data structure for authenticating membership queries in sets based on accumulators, and then show how to apply it to the problem of verifying the integrity of outsourced data. We also prove that our scheme is secure under the q-strong Diffie- Hellman assumption. More importantly, our scheme has the constant cost communication, meanwhile keeping other complexity measures constant. Compared to previous schemes based on accumulators, our scheme reduces update cost and so improves previous schemes based on accumulators. In addition, the experimental comparison shows that our scheme outperforms the previous schemes.
Unauthorized tampering with outsourced data can result in significant losses for both data owner and users.Data integrity therefore becomes an important factor in outsourced data systems.In this paper,we address this problem and propose a scheme for verifying the integrity of outsourced data.We first propose a new authenticated data structure for authenticating membership queries in sets based on accumulators,and then show how to apply it to the problem of verifying the integrity of outsourced data.We also prove that our scheme is secure under the q-strong DiffieHellman assumption.More importantly,our scheme has the constant cost communication,meanwhile keeping other complexity measures constant.Compared to previous schemes based on accumulators,our scheme reduces update cost and so improves previous schemes based on accumulators.In addition,the experimental comparison shows that our scheme outperforms the previous schemes.
Author WANG Xiaoming YU Fang LIN Yanchun GAN Qingqing WU Daini
AuthorAffiliation Department of Computer Science, Jinan University, Guangzhou China, 510632
AuthorAffiliation_xml – name: Department of Computer Science, Jinan University, Guangzhou China, 510632
Author_xml – sequence: 1
  givenname: Wang
  surname: Xiaoming
  fullname: Xiaoming, Wang
  organization: Department of Computer Science, Jinan University, Guangzhou China, 510632
– sequence: 2
  givenname: Yu
  surname: Fang
  fullname: Fang, Yu
  email: yufangh4@jnu.edu.cn
  organization: Department of Computer Science, Jinan University, Guangzhou China, 510632
– sequence: 3
  givenname: Lin
  surname: Yanchun
  fullname: Yanchun, Lin
  organization: Department of Computer Science, Jinan University, Guangzhou China, 510632
– sequence: 4
  givenname: Gan
  surname: Qingqing
  fullname: Qingqing, Gan
  organization: Department of Computer Science, Jinan University, Guangzhou China, 510632
– sequence: 5
  givenname: Wu
  surname: Daini
  fullname: Daini, Wu
  organization: Department of Computer Science, Jinan University, Guangzhou China, 510632
BookMark eNpFkLtvwjAQxj1QqbRl7tDFqtQx4LMd2xlR-kJCYuhjtYxzCUHFaZ2glv71DQLRW-6k-93j-y7IIDQBCbkGNgZg2STPx5xBOtZCKS5hQIagtEhSKfU5GbXtmvVhlBKKD4me0he_wg3Sson0HWNd7upQ0W6FdBY6rGLd7WhT0sW2a5tt9FjQe9e5K3JWuo8WR8d8Sd4eH17z52S-eJrl03niBZgu0ViY1GfMm6V0y5QvdVYAMgayyDxniFJwNACi4Ez1JULhQToulS64EEZckrvD3m8XShcqu-6fCP1F-1t1P3udvWbYc5MD52PTthFL-xnrjYs7C8zubbF5bve4PdrST9wcJmpEPNH_3dvjvlUTqq_ekhOilDKZZoaJP-KhanQ
CODEN CCHOBE
CitedBy_id crossref_primary_10_1016_j_comcom_2023_02_005
ContentType Journal Article
Copyright Copyright © Wanfang Data Co. Ltd. All Rights Reserved.
Copyright_xml – notice: Copyright © Wanfang Data Co. Ltd. All Rights Reserved.
DBID 2RA
92L
CQIGP
W92
~WA
97E
RIA
RIE
AAYXX
CITATION
2B.
4A8
92I
93N
PSX
TCJ
DOI 10.1109/CC.2015.7366241
DatabaseName 维普_期刊
中文科技期刊数据库-CALIS站点
维普中文期刊数据库
中文科技期刊数据库-工程技术
中文科技期刊数据库- 镜像站点
IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library Online
CrossRef
Wanfang Data Journals - Hong Kong
WANFANG Data Centre
Wanfang Data Journals
万方数据期刊 - 香港版
China Online Journals (COJ)
China Online Journals (COJ)
DatabaseTitle CrossRef
DatabaseTitleList

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Economics
EndPage 195
ExternalDocumentID zgtx201511018
10_1109_CC_2015_7366241
7366241
666897080
Genre orig-research
GrantInformation_xml – fundername: This work was supported in part by National Natural Science Foundation of China under Grant; Natural Science Foundation of Guangdong Province, China under Grant (S2012010008767).Science and Technology Planning Project of Guangdong Province, China under Grant
  funderid: (61070164,61272415); (2013B010401015)
GroupedDBID 0R~
29B
2B.
2C0
2RA
4.4
5GY
6IK
92H
92I
92L
92R
93N
97E
AAHTB
AAJGR
AASAJ
ABPEJ
AENEX
AKJIK
ALMA_UNASSIGNED_HOLDINGS
ATWAV
AZLTO
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CQIGP
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
M43
O9-
OCL
RIA
RIE
RIG
RNS
TCJ
TGT
U1G
U5S
U5T
W92
~WA
-SI
-SJ
-S~
AAXDM
ABQJQ
CAJEI
CAJEJ
Q--
Q-9
AAYXX
CITATION
4A8
PSX
ID FETCH-LOGICAL-c318t-7ed85c90c8b4ab52b79d1e0014d9c20ee432e8113d20632ee1dc14a2467d23383
IEDL.DBID RIE
ISSN 1673-5447
IngestDate Wed Nov 06 04:28:43 EST 2024
Fri Aug 23 04:05:12 EDT 2024
Mon Nov 04 12:08:55 EST 2024
Wed Feb 14 10:25:02 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 11
Keywords data integrity
constant complexity
authenticated data structure
outsourced data
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c318t-7ed85c90c8b4ab52b79d1e0014d9c20ee432e8113d20632ee1dc14a2467d23383
Notes 11-5439/TN
PageCount 8
ParticipantIDs ieee_primary_7366241
wanfang_journals_zgtx201511018
crossref_primary_10_1109_CC_2015_7366241
chongqing_primary_666897080
PublicationCentury 2000
PublicationDate 2015-11-01
PublicationDateYYYYMMDD 2015-11-01
PublicationDate_xml – month: 11
  year: 2015
  text: 2015-11-01
  day: 01
PublicationDecade 2010
PublicationTitle China communications
PublicationTitleAbbrev ChinaComm
PublicationTitleAlternate China Communications
PublicationTitle_FL China Communications
PublicationYear 2015
Publisher China Institute of Communications
Department of Computer Science, Jinan University, Guangzhou China, 510632
Publisher_xml – name: China Institute of Communications
– name: Department of Computer Science, Jinan University, Guangzhou China, 510632
SSID ssj0000866362
Score 2.027007
Snippet Unauthorized tampering with outsourced data can result in significant losses for both data owner and users.Data integrity therefore becomes an important factor...
Unauthorized tampering with outsourced data can result in significant losses for both data owner and users. Data integrity therefore becomes an important...
SourceID wanfang
crossref
ieee
chongqing
SourceType Aggregation Database
Publisher
StartPage 188
SubjectTerms authenticated
complexity
Complexity theory
constant
Cryptography
data
Data structures
datastructure
Generators
integrity
outsourced
Resistance
Servers
Title A Scheme for Verifying the Integrity of Outsourced Data
URI http://lib.cqvip.com/qk/89450X/201511/666897080.html
https://ieeexplore.ieee.org/document/7366241
https://d.wanfangdata.com.cn/periodical/zgtx201511018
Volume 12
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwELVoF1j4KohSqDwwMJA2dhLbGavQqhMLILFFiX0pDCRAGwnx6zk7aQQSC1vk2FF0_rh3Z79nQq40evE8A-EVRgVeyArt5VpEnkBoHYa50FFhc7rLe3n3pG7nVibnpuPCAIA7fAYT--j28k2la5sqm8pACG5Z6j0Zq4ar1eVTEJqLwN0fyoS0-_2hbJV8mB9Pk8Se4oom7ReskMJzVa7e0T38ckjuhhXH3ymLrFz9cDWLg__95CHZbyElnTVj4IjsQHlMdreM4_WAyBnFGBZegSJCpTh2Xxy5iSL2o41cBEJxWhW0qjdNMt9Qe3L0hDwu5g_J0msvTPA0Ts2NJ8GoSMe-VnmY5RHPZWwY2CjIxJr7AGHAQTEWGI7IhAMwo1mYcVwsDbex6inpl1UJZ4QGJs9MADEGgCpER6rAKZVpXzNcEPNiSEadBdO3RhgjxVBIxRIx6JBcb23avXTRhh-nSZLarkhbOw3JwNqwq9YVj9s-SNtJtU6_VptP25RZlbHzv9uNyJ6t0rAFL0h_81HDJemtTT124-UbwiW7mQ
link.rule.ids 315,782,786,798,27933,27934,54767
linkProvider IEEE
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELagDGXhVRDlUTwwMJASO46djCi0KuKxABJblNiXwkACtJUQv56zEyKQWNgix46i8-O-O_v7TMixRi-eZyC9wkSBJ1ihvVzL0JMIrYXIpQ4Lm9Od3Knbx-hiZGVyTlsuDAC4w2cwtI9uL99UemFTZWcqkJJblvpKKJRUNVurzaggOJeBu0GUSWV3_IVqtHyYH58liT3HFQ6bb1gphaeqnL6hg_jlktwdK47BUxZZOf3hbMbr__vNDbLWgEp6Xo-CTbIE5RbpfnOOZz2izilGsfACFDEqxdH77OhNFNEfrQUjEIzTqqDVYl6n8w21Z0e3ycN4dJ9MvObKBE_j5Jx7CkwU6tjXUS6yPOS5ig0DGweZWHMfQAQcIsYCwxGbcABmNBMZx-XScBut7pBOWZWwS2hg8swEEGMIGAl0pRE4rTLta4ZLYl70yX5rwfS1lsZIMRiKYoUotE9Ovm3avnTxhh-nSZLarkgbO_VJz9qwrdYWD5o-SJtpNUs_p_MP25RZnbG9v9sdke7k_uY6vb68vdonq7Z6zR08IJ35-wIOyfLMLAZu7HwB0Ye-6g
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+scheme+for+verifying+the+integrity+of+outsourced+data&rft.jtitle=China+communications&rft.au=Xiaoming%2C+Wang&rft.au=Fang%2C+Yu&rft.au=Yanchun%2C+Lin&rft.au=Qingqing%2C+Gan&rft.date=2015-11-01&rft.pub=China+Institute+of+Communications&rft.issn=1673-5447&rft.volume=12&rft.issue=11&rft.spage=1&rft.epage=8&rft_id=info:doi/10.1109%2FCC.2015.7366241&rft.externalDocID=7366241
thumbnail_s http://sdu.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F89450X%2F89450X.jpg
http://sdu.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fwww.wanfangdata.com.cn%2Fimages%2FPeriodicalImages%2Fzgtx%2Fzgtx.jpg