Achieving Lightweight Verifiable Privacy Preserving Search Over Encrypted Data

Selasi Kwame Ocansey, Charles Fynn Oduro

Abstract


When cloud clients outsource their database to the cloud, they entrust management operations to a cloud service provider who is expected to answer the client’s queries on the cloud where database is located. Efficient techniques can ensure critical requirements for outsourced data’s integrity and authenticity. A lightweight privacy preserving verifiable scheme for outsourcingdatabase securely is proposed, our scheme encrypts data before outsourcing and returned query results are verified with parameters of correctness and completeness. Our scheme is projected on lightweight homomorphic encryption technique and bloom filter which are efficiently authenticated to guarantee the outsourced database’s integrity, authenticity, and confidentiality. An ordering challenge technique is proposed for verifying top-k query results. We conclude by detailing our analysis of security proofs, privacy, verifiability and the performance efficiency of our scheme. Our proposed scheme’s proof and evaluation analysis show its security and efficiency for practical deployment. We also evaluate our scheme’s performances over two UCI data sets.


Keywords


Verifiable Search, Outsourced Database; Cloud Computing; Privacy Preserving

Full Text:

PDF

References


J. Wang, X. Chen, X. Huang, I. You, and Y. Xiang, "Verifiable auditing for outsourced database in cloud computing," IEEE transactions on computers, no. 1, pp. 1-1, 2015.

J. Wang, X. Chen, J. Li, J. Zhao, and J. Shen, "Towards achieving flexible and verifiable search for outsourced database in cloud computing," Future Generation Computer Systems, vol. 67, pp. 266-275, 2017.

Z. Xu et al., "Crowdsourcing based description of urban emergency events using social media big data," IEEE Transactions on Cloud Computing, vol. 10, p. 1109, 2016.

M. Kumar and S. K. Pasupuleti, "Lightweight Verifiable Auditing for Outsourced Database in Cloud Computing," in International Conference on Distributed Computing and Internet Technology, 2018: Springer, pp. 280-287.

Z. Wan and R. H. Deng, "VPSearch: achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data," IEEE Transactions on Dependable and Secure Computing, 2016.

H. Pang, A. Jain, K. Ramamritham, and K.-L. Tan, "Verifying completeness of relational query results in data publishing," in Proceedings of the 2005 ACM SIGMOD international conference on Management of data, 2005: ACM, pp. 407-418.

M. Lichman, "UCI machine learning repository," ed: Irvine, CA, 2013.

Y. Zhang, J. Katz, and C. Papamanthou, "IntegriDB: Verifiable SQL for outsourced databases," in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015: ACM, pp. 1480-1491.

J. Yuan and S. Yu, "Flexible and publicly verifiable aggregation query for outsourced databases in cloud," in Communications and network security (cns), IEEE, pp. 520-524.

E. Mykletun, M. Narasimha, and G. Tsudik, "Authentication and integrity in outsourced databases," ACM Transactions on Storage (TOS), vol. 2, no. 2, pp. 107-138, 2006.




DOI: http://dx.doi.org/10.30630/joiv.3.3.267

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.


JOIV : International Journal on Informatics Visualization
Published by Information Technology Department
Politeknik Negeri Padang, Indonesia

© JOIV - ISSN : 2549-9610 | e-ISSN : 2549-9904 

Phone : +62-82386434344
Email  : hidraamnur@live.com | hidra@pnp.ac.id


Creative Commons License is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

View My Stats