Toward authenticated and complete query results from cloud storages

Fu Kuo Tseng*, Yung Hsiang Liu, Rong-Jaye Chen

*此作品的通信作者

研究成果: Conference contribution同行評審

6 引文 斯高帕斯(Scopus)

摘要

Cloud computing enables a new paradigm of information and communication resources on demand. Users, enterprises, governments start to consider moving their data into the cloud to enjoy its storage capacity and computation capability. Related data confidentiality, integrity and authentication have been extensively investigated, while newly introduced security concern is not fully addressed, namely, the security of the query results. The cloud storage providers (CSPs) might not be fully trusted and susceptible to be compromised. In addition, the CSPs might deliberately search only part of user data for their own purpose, or they might just be incompetent to carry out complex search requests, which yield incorrect query replies. Therefore, an authentication mechanism of query results is required to enable cloud users not only to protect the security of the data in the cloud, but also to verify the correctness of the query results from the CSPs. In this paper, we propose an efficient authentication scheme for CSPs to provide the proof of a query results and for cloud users to be assured by verifying the proof. We also present extensive security and performance analysis and show that our scheme is secure and efficient for the cloud users.

原文English
主出版物標題Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012
頁面1204-1209
頁數6
DOIs
出版狀態Published - 5 11月 2012
事件11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - Liverpool, United Kingdom
持續時間: 25 6月 201227 6月 2012

出版系列

名字Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012

Conference

Conference11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012
國家/地區United Kingdom
城市Liverpool
期間25/06/1227/06/12

指紋

深入研究「Toward authenticated and complete query results from cloud storages」主題。共同形成了獨特的指紋。

引用此