TY - JOUR
T1 - Integrity coded databases - protecting data integrity for outsourced databases
AU - Yeh, Jyh haw
AU - Arifin, Md Mashrur
AU - Shen, Ning
AU - Karki, Ujwal
AU - Xie, Yi
AU - Nanjundarao, Archana
N1 - Publisher Copyright:
© 2023 Elsevier Ltd
PY - 2024/1
Y1 - 2024/1
N2 - In recent years, cloud storage has become a viable option for businesses to store and retrieve information. This storage service allows its clients releasing from financial burden of hiring professionals to maintain local databases. However, it comes at a cost of requiring the clients to relinquish control of their data to cloud service providers. There remains the possibility of malicious attacks to make the data no longer correct, fresh nor complete. This paper presents a novel database model called the Integrity Coded Database (ICDB), where the model allows the client to insert Integrity Codes (ICs), as well as fake tuples, to an outsourced database, run queries against the server, and verify that the queried data from the cloud is both correct, fresh and complete. We have benchmarked and evaluated six ICDB schemes with different combinations of three IC generation algorithms and two integrity verification modes.
AB - In recent years, cloud storage has become a viable option for businesses to store and retrieve information. This storage service allows its clients releasing from financial burden of hiring professionals to maintain local databases. However, it comes at a cost of requiring the clients to relinquish control of their data to cloud service providers. There remains the possibility of malicious attacks to make the data no longer correct, fresh nor complete. This paper presents a novel database model called the Integrity Coded Database (ICDB), where the model allows the client to insert Integrity Codes (ICs), as well as fake tuples, to an outsourced database, run queries against the server, and verify that the queried data from the cloud is both correct, fresh and complete. We have benchmarked and evaluated six ICDB schemes with different combinations of three IC generation algorithms and two integrity verification modes.
KW - Aggregate verification
KW - Database integrity
KW - Database outsourcing
KW - Integrity code
KW - Message authentication code
UR - http://www.scopus.com/inward/record.url?scp=85175726292&partnerID=8YFLogxK
U2 - 10.1016/j.cose.2023.103569
DO - 10.1016/j.cose.2023.103569
M3 - Article
AN - SCOPUS:85175726292
SN - 0167-4048
VL - 136
JO - Computers and Security
JF - Computers and Security
M1 - 103569
ER -