Completeness integrity protection for outsourced databases using semantic fake data

Holly Roisum, Lois Urizar, Jyh Haw Yeh, Kedric Salisbury, Megan Magette

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

As cloud storage and computing gains popularity, data entrusted to the cloud has the potential to be exposed to more people and thus more vulnerable to attacks. It is important to develop mechanisms to protect data privacy and integrity so that clients can safely outsource their data to the cloud. We present a method for ensuring data completeness which is one facet of the data integrity problem. Our approach converts a standard database to a Completeness Protected Database (CPDB) by inserting some semantic fake data before outsourcing it to the cloud. These fake data are initially produced using our generating function which uses Order Preserving Encryption, which allows the user to be able to regenerate these fake data and match them to fake data returned from a range query to check for completeness. The CPDB is innovative in the following ways: (1) fake data is deterministically generated but is semantically indistinguishable from other existing data; (2) since fake data is generated by deterministic functions, data owners do not need to locally store the fake data that have been inserted, instead they can re-generate fake data using the functions; (3) no costly data encryption/signature is used in our scheme compared to previous work which encrypt/sign the entire database.

Original languageEnglish
Title of host publicationProceedings - 2019 4th International Conference on Communication and Information Systems, ICCIS 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages222-228
Number of pages7
ISBN (Electronic)9781728162973
DOIs
StatePublished - Dec 2019
Event4th International Conference on Communication and Information Systems, ICCIS 2019 - Wuhan, China
Duration: 21 Dec 201923 Dec 2019

Publication series

NameProceedings - 2019 4th International Conference on Communication and Information Systems, ICCIS 2019

Conference

Conference4th International Conference on Communication and Information Systems, ICCIS 2019
Country/TerritoryChina
CityWuhan
Period21/12/1923/12/19

Keywords

  • Cloud computing
  • Data integrity
  • Outsourced database

Fingerprint

Dive into the research topics of 'Completeness integrity protection for outsourced databases using semantic fake data'. Together they form a unique fingerprint.

Cite this