2010
DOI: 10.1002/cpe.1566
|View full text |Cite
|
Sign up to set email alerts
|

Bucket‐based authentication for outsourced databases

Abstract: SUMMARYWhen outsourced database owners delegate their data to service providers, which might be untrusted or compromised, two issues of data security emerge, including data confidentiality and data integrity. Most of the previous research focuses on only one issue and the solution to integrate two approaches is expensive. In this paper, we propose bucket-based authentication that can keep data confidentiality and meanwhile guarantee data integrity. Specifically, we first propose a new approach based on bucket … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 20 publications
0
10
0
Order By: Relevance
“…Then, the user issues a query to the server (line 2). Upon receiving a query, the service provider retrieves the hash index and the private authentication index to return an encrypted original data set for the query (line [3][4] and their signatures (line [5][6][7][8]. Finally, the user generates signatures of query results by using the RSA key sent from the data owner, and compares the signature with result signature (line 9-13).…”
Section: Query Processing With Results Authenticationmentioning
confidence: 99%
See 4 more Smart Citations
“…Then, the user issues a query to the server (line 2). Upon receiving a query, the service provider retrieves the hash index and the private authentication index to return an encrypted original data set for the query (line [3][4] and their signatures (line [5][6][7][8]. Finally, the user generates signatures of query results by using the RSA key sent from the data owner, and compares the signature with result signature (line 9-13).…”
Section: Query Processing With Results Authenticationmentioning
confidence: 99%
“…Bucket-based index was proposed by Hacigumus [16] and its variants has been studied in [4,[17][18]. A bucket-based index contains {bucket id, data range, number of tuples in the bucket, checksum}.…”
Section: Bucket-based Authentication Approachesmentioning
confidence: 99%
See 3 more Smart Citations