• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xian Hequn, Feng Dengguo. An Integrity Checking Scheme in Outsourced Database Model[J]. Journal of Computer Research and Development, 2010, 47(6): 1107-1115.
Citation: Xian Hequn, Feng Dengguo. An Integrity Checking Scheme in Outsourced Database Model[J]. Journal of Computer Research and Development, 2010, 47(6): 1107-1115.

An Integrity Checking Scheme in Outsourced Database Model

More Information
  • Published Date: June 14, 2010
  • In the outsourced database model, databases face potential threats from malicious database service providers. Security mechanisms are needed to assure the queriers that the query results have not been tempered with and are authentic with respect to the actual data owner. As an improvement of the existing authenticated-data-structure-based methods, a new integrity checking scheme is proposed using the masked authenticating B/++-tree (MABTree) as the underlying data structure. Common computational information is extracted from the MABTree and is stored in two mask vectors, so as to make the computation in the data structure more efficient. By avoiding mass exponential computation, the scheme reduces both the computational overhead in the integrity check process and the verification time of the query results. The MABTree is designed to support incremental updating, which makes the scheme more efficient when the owner updates the data and the authenticated data structures are updated accordingly. The security proof of the scheme is presented together with the formal definition of the MABTree. Experiments show that, compared with the existing methods, the proposed scheme has a better performance in query verification and a much better performance in the authenticated data structure updating operations.
  • Related Articles

    [1]Liu Yanfang, Li Wenbin, Gao Yang. Adaptive Neighborhood Embedding Based Unsupervised Feature Selection[J]. Journal of Computer Research and Development, 2020, 57(8): 1639-1649. DOI: 10.7544/issn1000-1239.2020.20200219
    [2]Yao Sheng, Xu Feng, Zhao Peng, Ji Xia. Intuitionistic Fuzzy Entropy Feature Selection Algorithm Based on Adaptive Neighborhood Space Rough Set Model[J]. Journal of Computer Research and Development, 2018, 55(4): 802-814. DOI: 10.7544/issn1000-1239.2018.20160919
    [3]Zhang Yuanpeng, Deng Zhaohong, Chung Fu-lai, Hang Wenlong, Wang Shitong. Fast Self-Adaptive Clustering Algorithm Based on Exemplar Score Strategy[J]. Journal of Computer Research and Development, 2018, 55(1): 163-178. DOI: 10.7544/issn1000-1239.2018.20160937
    [4]Gu Lianchao, Cui Lizhen. A Scalable and Self-Adjust Multi-Tenant Data Storage Strategy Under Different SLAs[J]. Journal of Computer Research and Development, 2014, 51(9): 2058-2069. DOI: 10.7544/issn1000-1239.2014.20131339
    [5]Bi Xiaojun, Liu Guo'an, Xiao Jing. Dynamic Adaptive Differential Evolution Based on Novel Mutation Strategy[J]. Journal of Computer Research and Development, 2012, 49(6): 1288-1297.
    [6]Gong Maoguo, Cheng Gang, Jiao Licheng, and Liu Chao. Nondominated Individual Selection Strategy Based on Adaptive Partition for Evolutionary Multi-Objective Optimization[J]. Journal of Computer Research and Development, 2011, 48(4): 545-557.
    [7]Fan Xiaoqin, Jiang Changjun, Fang Xianwen, Ding Zhijun. Dynamic Web Service Selection Based on Discrete Particle Swarm Optimization[J]. Journal of Computer Research and Development, 2010, 47(1): 147-156.
    [8]Zeng Zhiqiang, Wu Qun, Liao Beishui, Zhu Shunzhi. An Improved Working Set Selection Strategy for Sequential Minimal Optimization Algorithm[J]. Journal of Computer Research and Development, 2009, 46(11): 1925-1933.
    [9]Liu Anfeng, Chen Zhigang, Long Guoping, and Zeng Zhiwen. A Resource Optimizing Scheduling Algorithm of Differentiated Service of Double Minimum Balance in Web Clusters[J]. Journal of Computer Research and Development, 2005, 42(11): 1969-1976.
    [10]Xu Mingwei, Hu Chunming, Liu Xudong, and Ma Dianfu. Research and Implementation of Web Service Differentiated QoS[J]. Journal of Computer Research and Development, 2005, 42(4): 669-675.

Catalog

    Article views (855) PDF downloads (946) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return