云数据库即服务中的数据完整性评估

Puya Ghazizadeh, R. Mukkamala, S. Olariu
{"title":"云数据库即服务中的数据完整性评估","authors":"Puya Ghazizadeh, R. Mukkamala, S. Olariu","doi":"10.1109/SERVICES.2013.40","DOIUrl":null,"url":null,"abstract":"Data integrity is a major concern in outsourced IT services like cloud computing. Cloud computing has become popular because of cost reductions, time saving and mobility in service. However data integrity is still an unresolved issue in cloud services. We present an efficient mechanism for evaluating data integrity in cloud database-as-a-service. Our approach is based on inserting fake tuples into the database. In our model the owner of the data is the only trusted party and the server as a service provider or any other users are not trusted. We refer to distrusted party as a potentially malicious attacker. In our approach we define generating functions to create fake tuples with uniform distribution. Malicious attackers are not able to distinguish between fake tuples and real tuples. Our approach does not use encryption which makes it more efficient. We explore the strengths and limitations of these generating functions by describing our approach.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"25","resultStr":"{\"title\":\"Data Integrity Evaluation in Cloud Database-as-a-Service\",\"authors\":\"Puya Ghazizadeh, R. Mukkamala, S. Olariu\",\"doi\":\"10.1109/SERVICES.2013.40\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data integrity is a major concern in outsourced IT services like cloud computing. Cloud computing has become popular because of cost reductions, time saving and mobility in service. However data integrity is still an unresolved issue in cloud services. We present an efficient mechanism for evaluating data integrity in cloud database-as-a-service. Our approach is based on inserting fake tuples into the database. In our model the owner of the data is the only trusted party and the server as a service provider or any other users are not trusted. We refer to distrusted party as a potentially malicious attacker. In our approach we define generating functions to create fake tuples with uniform distribution. Malicious attackers are not able to distinguish between fake tuples and real tuples. Our approach does not use encryption which makes it more efficient. We explore the strengths and limitations of these generating functions by describing our approach.\",\"PeriodicalId\":169370,\"journal\":{\"name\":\"2013 IEEE Ninth World Congress on Services\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-06-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"25\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 IEEE Ninth World Congress on Services\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SERVICES.2013.40\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE Ninth World Congress on Services","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SERVICES.2013.40","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 25

摘要

数据完整性是云计算等外包IT服务的主要关注点。云计算因为降低成本、节省时间和服务的移动性而变得流行。然而,数据完整性在云服务中仍然是一个未解决的问题。我们提出了一种评估云数据库即服务中数据完整性的有效机制。我们的方法是将假元组插入数据库。在我们的模型中,数据的所有者是唯一受信任的一方,而作为服务提供者的服务器或任何其他用户都不受信任。我们将不受信任的一方称为潜在的恶意攻击者。在我们的方法中,我们定义了生成函数来创建均匀分布的伪元组。恶意攻击者无法区分假元组和真元组。我们的方法不使用加密,这使得它更有效。我们通过描述我们的方法来探索这些生成函数的优点和局限性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Data Integrity Evaluation in Cloud Database-as-a-Service
Data integrity is a major concern in outsourced IT services like cloud computing. Cloud computing has become popular because of cost reductions, time saving and mobility in service. However data integrity is still an unresolved issue in cloud services. We present an efficient mechanism for evaluating data integrity in cloud database-as-a-service. Our approach is based on inserting fake tuples into the database. In our model the owner of the data is the only trusted party and the server as a service provider or any other users are not trusted. We refer to distrusted party as a potentially malicious attacker. In our approach we define generating functions to create fake tuples with uniform distribution. Malicious attackers are not able to distinguish between fake tuples and real tuples. Our approach does not use encryption which makes it more efficient. We explore the strengths and limitations of these generating functions by describing our approach.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信