Back to Search Start Over

Efficient detection of unauthorized data modification in cloud databases

Authors :
Mirco Marchetti
Marcello Missiroli
Fabio Pierazzi
Luca Ferretti
Michele Colajanni
FERRETTI, LUCA
PIERAZZI, FABIO
COLAJANNI, Michele
MARCHETTI, Mirco
MISSIROLI, MARCELLO
Source :
ISCC
Publication Year :
2014
Publisher :
IEEE, 2014.

Abstract

Cloud services represent an unprecedented opportunity, but their adoption is hindered by confidentiality and integrity issues related to the risks of outsourcing private data to cloud providers. This paper focuses on integrity and proposes an innovative solution that allows cloud tenants to detect unauthorized modifications to outsourced data while minimizing storage and network overheads. Our approach is based on encrypted Bloom filters, and is designed to allow efficient integrity verification for databases stored in the cloud. We assess the effectiveness of the proposal as well as its performance improvements with respect to existing solutions by evaluating storage and network costs.

Details

Database :
OpenAIRE
Journal :
2014 IEEE Symposium on Computers and Communications (ISCC)
Accession number :
edsair.doi.dedup.....877b4951d3365ce4193f5771371e60c2
Full Text :
https://doi.org/10.1109/iscc.2014.6912574