Paper 2015/351

Database Outsourcing with Hierarchical Authenticated Data Structures

Mohammad Etemad and Alptekin Küpçü

Abstract

In an outsourced database scheme, the data owner delegates the data management tasks to a remote service provider. At a later time, the remote service is supposed to answer any query on the database. The essential requirements are ensuring the data integrity and authenticity with efficient mechanisms. Current approaches employ authenticated data structures to store security information, generated by the client and used by the server, to compute proofs that show the answers to the queries are authentic. The existing solutions have shortcomings with multi-clause queries and duplicate values in a column. We propose a hierarchical authenticated data structure for storing security information, which alleviates the mentioned problems. Our solution handles many different types of queries, including multi-clause selection and join queries, in a dynamic database. We provide a unified formal definition of a secure outsourced database scheme, and prove that our proposed scheme is secure according to this definition, which captures previously separate properties such as correctness, completeness, and freshness. The performance evaluation based on our prototype implementation confirms the efficiency of our proposed scheme, showing about 3x to 5x enhancement in proof size and proof generation time in comparison to previous work, and about only 4% communication overhead compared to the actual query result in a real university database.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
Databases outsourcingHierarchical authenticated data structuresAuthenticated join processing
Contact author(s)
metemad @ ku edu tr
History
2015-04-26: revised
2015-04-23: received
See all versions
Short URL
https://ia.cr/2015/351
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/351,
      author = {Mohammad Etemad and Alptekin Küpçü},
      title = {Database Outsourcing with Hierarchical Authenticated Data Structures},
      howpublished = {Cryptology ePrint Archive, Paper 2015/351},
      year = {2015},
      note = {\url{https://eprint.iacr.org/2015/351}},
      url = {https://eprint.iacr.org/2015/351}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.