Please use this identifier to cite or link to this item: https://scholarbank.nus.edu.sg/handle/10635/33347
Title: Towards efficient proofs of storage and verifiable outsourced database in cloud computing
Authors: XU JIA
Keywords: Proofs of Storage, Homomorphic MAC, Outsourced Database, Aggregate Range Query, Functional Encryption, Generalized Knowledge of Exponent Assumption
Issue Date: 20-Jan-2012
Citation: XU JIA (2012-01-20). Towards efficient proofs of storage and verifiable outsourced database in cloud computing. ScholarBank@NUS Repository.
Abstract: Cloud computing is becoming an important topic in both industry and academic communities. While cloud computing provides many benefits, it also brings in new challenges in research, especially in information security. One of the main challenges is how to achieve a pair of apparently conflicting requirements simultaneously: efficiency in communication, storage and computation on both client and server sides, and security against outside and internal attackers. Security concerns consist of data confidentiality and data integrity. This dissertation is devoted to efficiently verify integrity in cloud storage and outsourced database. The main strategy is to devise new homomorphic cryptographic methods. For cloud storage, we propose three efficient methods that allow users to remotely check the integrity of their files stored in a potentially dishonest cloud storage server, without downloading their files. These three methods rely on three underlying homomorphic authentication methods, which we design with different techniques. All of these three underlying homomorphic authentication methods support linear homomorphism: Given a public key and a sequence of message-tag pairs, any third party can compute a valid authentication tag for a linear combination of these messages. Furthermore, the second and third authentication methods support an additional homomorphism: Given a public key and an authentication tag of a long message, any third party can compute a valid authentication tag for a short message, as long as the short message and the long message satisfy a predetermined predicate. We prove security properties of the proposed schemes under various cryptographic hard problem assumptions. For outsourced database, we propose an efficient authentication method that allows users to query their database which is maintained by a potentially dishonest server, and verify the correctness and completeness of the query results returned by the server. Supported database queries include aggregate count/min/max/median query conditional on multidimensional rectangular range selection, and non-aggregate multidimensional rectangular range selection query. The proposed method relies on our newly constructed functional encryption scheme. This functional encryption scheme allows a third party, with a delegation key that is generated on the fly, to compute a designated function (the function is specified in the delegation key) value of the plaintext from the corresponding ciphertext, yet without knowing the value of the plaintext. We prove security properties of the proposed schemes under various cryptographic hard problem assumptions.
URI: http://scholarbank.nus.edu.sg/handle/10635/33347
Appears in Collections:Ph.D Theses (Open)

Show full item record
Files in This Item:
File Description SizeFormatAccess SettingsVersion 
xujia-thesis-A0002244B-May15-2012.pdf1.27 MBAdobe PDF

OPEN

NoneView/Download

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.