Back to Search
Start Over
Efficient detection of unauthorized data modification in cloud databases
- Source :
- ISCC
- Publication Year :
- 2014
- Publisher :
- IEEE, 2014.
-
Abstract
- Cloud services represent an unprecedented opportunity, but their adoption is hindered by confidentiality and integrity issues related to the risks of outsourcing private data to cloud providers. This paper focuses on integrity and proposes an innovative solution that allows cloud tenants to detect unauthorized modifications to outsourced data while minimizing storage and network overheads. Our approach is based on encrypted Bloom filters, and is designed to allow efficient integrity verification for databases stored in the cloud. We assess the effectiveness of the proposal as well as its performance improvements with respect to existing solutions by evaluating storage and network costs.
- Subjects :
- cryptography
database management systems
Database
Computer science
business.industry
probability
cloud computing
Cloud computing
Cryptography
data structure
Computer security
computer.software_genre
Encryption
Outsourcing
software performance evaluation
data structures
cloud computing, cryptography, data structures, database management systems, probability, software performance evaluation
database management system
business
computer
Subjects
Details
- Database :
- OpenAIRE
- Journal :
- 2014 IEEE Symposium on Computers and Communications (ISCC)
- Accession number :
- edsair.doi.dedup.....877b4951d3365ce4193f5771371e60c2
- Full Text :
- https://doi.org/10.1109/iscc.2014.6912574