Integrity coded databases - protecting data integrity for outsourced databases

Jyh haw Yeh, Md Mashrur Arifin, Ning Shen, Ujwal Karki, Yi Xie, Archana Nanjundarao

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

In recent years, cloud storage has become a viable option for businesses to store and retrieve information. This storage service allows its clients releasing from financial burden of hiring professionals to maintain local databases. However, it comes at a cost of requiring the clients to relinquish control of their data to cloud service providers. There remains the possibility of malicious attacks to make the data no longer correct, fresh nor complete. This paper presents a novel database model called the Integrity Coded Database (ICDB), where the model allows the client to insert Integrity Codes (ICs), as well as fake tuples, to an outsourced database, run queries against the server, and verify that the queried data from the cloud is both correct, fresh and complete. We have benchmarked and evaluated six ICDB schemes with different combinations of three IC generation algorithms and two integrity verification modes.

Original languageEnglish
Article number103569
JournalComputers and Security
Volume136
DOIs
StatePublished - Jan 2024

Keywords

  • Aggregate verification
  • Database integrity
  • Database outsourcing
  • Integrity code
  • Message authentication code

Fingerprint

Dive into the research topics of 'Integrity coded databases - protecting data integrity for outsourced databases'. Together they form a unique fingerprint.

Cite this