TY - GEN
T1 - Toward authenticated and complete query results from cloud storages
AU - Tseng, Fu Kuo
AU - Liu, Yung Hsiang
AU - Chen, Rong-Jaye
PY - 2012/11/5
Y1 - 2012/11/5
N2 - Cloud computing enables a new paradigm of information and communication resources on demand. Users, enterprises, governments start to consider moving their data into the cloud to enjoy its storage capacity and computation capability. Related data confidentiality, integrity and authentication have been extensively investigated, while newly introduced security concern is not fully addressed, namely, the security of the query results. The cloud storage providers (CSPs) might not be fully trusted and susceptible to be compromised. In addition, the CSPs might deliberately search only part of user data for their own purpose, or they might just be incompetent to carry out complex search requests, which yield incorrect query replies. Therefore, an authentication mechanism of query results is required to enable cloud users not only to protect the security of the data in the cloud, but also to verify the correctness of the query results from the CSPs. In this paper, we propose an efficient authentication scheme for CSPs to provide the proof of a query results and for cloud users to be assured by verifying the proof. We also present extensive security and performance analysis and show that our scheme is secure and efficient for the cloud users.
AB - Cloud computing enables a new paradigm of information and communication resources on demand. Users, enterprises, governments start to consider moving their data into the cloud to enjoy its storage capacity and computation capability. Related data confidentiality, integrity and authentication have been extensively investigated, while newly introduced security concern is not fully addressed, namely, the security of the query results. The cloud storage providers (CSPs) might not be fully trusted and susceptible to be compromised. In addition, the CSPs might deliberately search only part of user data for their own purpose, or they might just be incompetent to carry out complex search requests, which yield incorrect query replies. Therefore, an authentication mechanism of query results is required to enable cloud users not only to protect the security of the data in the cloud, but also to verify the correctness of the query results from the CSPs. In this paper, we propose an efficient authentication scheme for CSPs to provide the proof of a query results and for cloud users to be assured by verifying the proof. We also present extensive security and performance analysis and show that our scheme is secure and efficient for the cloud users.
KW - authenticated and complete query results
KW - hash-based message authentication code (HMAC)
KW - public-key encryption with keyword search (PEKS)
KW - storages
UR - http://www.scopus.com/inward/record.url?scp=84868087231&partnerID=8YFLogxK
U2 - 10.1109/TrustCom.2012.277
DO - 10.1109/TrustCom.2012.277
M3 - Conference contribution
AN - SCOPUS:84868087231
SN - 9780769547459
T3 - Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012
SP - 1204
EP - 1209
BT - Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012
T2 - 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012
Y2 - 25 June 2012 through 27 June 2012
ER -