Toward authenticated and complete query results from cloud storages

Fu Kuo Tseng*, Yung Hsiang Liu, Rong-Jaye Chen

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

Cloud computing enables a new paradigm of information and communication resources on demand. Users, enterprises, governments start to consider moving their data into the cloud to enjoy its storage capacity and computation capability. Related data confidentiality, integrity and authentication have been extensively investigated, while newly introduced security concern is not fully addressed, namely, the security of the query results. The cloud storage providers (CSPs) might not be fully trusted and susceptible to be compromised. In addition, the CSPs might deliberately search only part of user data for their own purpose, or they might just be incompetent to carry out complex search requests, which yield incorrect query replies. Therefore, an authentication mechanism of query results is required to enable cloud users not only to protect the security of the data in the cloud, but also to verify the correctness of the query results from the CSPs. In this paper, we propose an efficient authentication scheme for CSPs to provide the proof of a query results and for cloud users to be assured by verifying the proof. We also present extensive security and performance analysis and show that our scheme is secure and efficient for the cloud users.

Original languageEnglish
Title of host publicationProc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012
Pages1204-1209
Number of pages6
DOIs
StatePublished - 5 Nov 2012
Event11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - Liverpool, United Kingdom
Duration: 25 Jun 201227 Jun 2012

Publication series

NameProc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012

Conference

Conference11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012
CountryUnited Kingdom
CityLiverpool
Period25/06/1227/06/12

Keywords

  • authenticated and complete query results
  • hash-based message authentication code (HMAC)
  • public-key encryption with keyword search (PEKS)
  • storages

Fingerprint Dive into the research topics of 'Toward authenticated and complete query results from cloud storages'. Together they form a unique fingerprint.

Cite this