Loading…

Efficient detection of unauthorized data modification in cloud databases

Cloud services represent an unprecedented opportunity, but their adoption is hindered by confidentiality and integrity issues related to the risks of outsourcing private data to cloud providers. This paper focuses on integrity and proposes an innovative solution that allows cloud tenants to detect u...

Full description

Saved in:
Bibliographic Details
Main Authors: Ferretti, Luca, Pierazzi, Fabio, Colajanni, Michele, Marchetti, Mirco, Missiroli, Marcello
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 6
container_issue
container_start_page 1
container_title
container_volume
creator Ferretti, Luca
Pierazzi, Fabio
Colajanni, Michele
Marchetti, Mirco
Missiroli, Marcello
description Cloud services represent an unprecedented opportunity, but their adoption is hindered by confidentiality and integrity issues related to the risks of outsourcing private data to cloud providers. This paper focuses on integrity and proposes an innovative solution that allows cloud tenants to detect unauthorized modifications to outsourced data while minimizing storage and network overheads. Our approach is based on encrypted Bloom filters, and is designed to allow efficient integrity verification for databases stored in the cloud. We assess the effectiveness of the proposal as well as its performance improvements with respect to existing solutions by evaluating storage and network costs.
doi_str_mv 10.1109/ISCC.2014.6912574
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_6912574</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6912574</ieee_id><sourcerecordid>6912574</sourcerecordid><originalsourceid>FETCH-LOGICAL-i123t-5c99aa6f4fdbbdc0381e24d4a87e7f81560bbd7ab1653919a7be1148f319c343</originalsourceid><addsrcrecordid>eNotkM1KAzEUhaMoONY-gLjJC8yYm9wkk6UMtS0UXNh9yS8G2hmZySz06S22qwPf-TiLQ8gzsAaAmdftZ9c1nAE2ygCXGm_II6A2BrnWeEsqrpDXWrTmjlQgBatBoHogy2nKjnGlFUojK7JZpZR9jn2hIZboSx56OiQ693YuX8OYf2OgwRZLT0PIZ9X-G7mn_jjMl8rZKU5P5D7Z4xSX11yQ_ftq323q3cd6273t6gxclFp6Y6xVCVNwLngmWogcA9pWR51akIqdubYOlBQGjNUuAmCbBBgvUCzIy2U2xxgP32M-2fHncP1A_AEPb07z</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Efficient detection of unauthorized data modification in cloud databases</title><source>IEEE Xplore All Conference Series</source><creator>Ferretti, Luca ; Pierazzi, Fabio ; Colajanni, Michele ; Marchetti, Mirco ; Missiroli, Marcello</creator><creatorcontrib>Ferretti, Luca ; Pierazzi, Fabio ; Colajanni, Michele ; Marchetti, Mirco ; Missiroli, Marcello</creatorcontrib><description>Cloud services represent an unprecedented opportunity, but their adoption is hindered by confidentiality and integrity issues related to the risks of outsourcing private data to cloud providers. This paper focuses on integrity and proposes an innovative solution that allows cloud tenants to detect unauthorized modifications to outsourced data while minimizing storage and network overheads. Our approach is based on encrypted Bloom filters, and is designed to allow efficient integrity verification for databases stored in the cloud. We assess the effectiveness of the proposal as well as its performance improvements with respect to existing solutions by evaluating storage and network costs.</description><identifier>ISSN: 1530-1346</identifier><identifier>EISSN: 2642-7389</identifier><identifier>EISBN: 1479942774</identifier><identifier>EISBN: 9781479942770</identifier><identifier>DOI: 10.1109/ISCC.2014.6912574</identifier><language>eng</language><publisher>IEEE</publisher><subject>Cloud computing ; Encryption ; Equations ; Proposals</subject><ispartof>2014 IEEE Symposium on Computers and Communications (ISCC), 2014, p.1-6</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6912574$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,23930,23931,25140,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6912574$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Ferretti, Luca</creatorcontrib><creatorcontrib>Pierazzi, Fabio</creatorcontrib><creatorcontrib>Colajanni, Michele</creatorcontrib><creatorcontrib>Marchetti, Mirco</creatorcontrib><creatorcontrib>Missiroli, Marcello</creatorcontrib><title>Efficient detection of unauthorized data modification in cloud databases</title><title>2014 IEEE Symposium on Computers and Communications (ISCC)</title><addtitle>ISCC</addtitle><description>Cloud services represent an unprecedented opportunity, but their adoption is hindered by confidentiality and integrity issues related to the risks of outsourcing private data to cloud providers. This paper focuses on integrity and proposes an innovative solution that allows cloud tenants to detect unauthorized modifications to outsourced data while minimizing storage and network overheads. Our approach is based on encrypted Bloom filters, and is designed to allow efficient integrity verification for databases stored in the cloud. We assess the effectiveness of the proposal as well as its performance improvements with respect to existing solutions by evaluating storage and network costs.</description><subject>Cloud computing</subject><subject>Encryption</subject><subject>Equations</subject><subject>Proposals</subject><issn>1530-1346</issn><issn>2642-7389</issn><isbn>1479942774</isbn><isbn>9781479942770</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2014</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotkM1KAzEUhaMoONY-gLjJC8yYm9wkk6UMtS0UXNh9yS8G2hmZySz06S22qwPf-TiLQ8gzsAaAmdftZ9c1nAE2ygCXGm_II6A2BrnWeEsqrpDXWrTmjlQgBatBoHogy2nKjnGlFUojK7JZpZR9jn2hIZboSx56OiQ693YuX8OYf2OgwRZLT0PIZ9X-G7mn_jjMl8rZKU5P5D7Z4xSX11yQ_ftq323q3cd6273t6gxclFp6Y6xVCVNwLngmWogcA9pWR51akIqdubYOlBQGjNUuAmCbBBgvUCzIy2U2xxgP32M-2fHncP1A_AEPb07z</recordid><startdate>20140601</startdate><enddate>20140601</enddate><creator>Ferretti, Luca</creator><creator>Pierazzi, Fabio</creator><creator>Colajanni, Michele</creator><creator>Marchetti, Mirco</creator><creator>Missiroli, Marcello</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>20140601</creationdate><title>Efficient detection of unauthorized data modification in cloud databases</title><author>Ferretti, Luca ; Pierazzi, Fabio ; Colajanni, Michele ; Marchetti, Mirco ; Missiroli, Marcello</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i123t-5c99aa6f4fdbbdc0381e24d4a87e7f81560bbd7ab1653919a7be1148f319c343</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Cloud computing</topic><topic>Encryption</topic><topic>Equations</topic><topic>Proposals</topic><toplevel>online_resources</toplevel><creatorcontrib>Ferretti, Luca</creatorcontrib><creatorcontrib>Pierazzi, Fabio</creatorcontrib><creatorcontrib>Colajanni, Michele</creatorcontrib><creatorcontrib>Marchetti, Mirco</creatorcontrib><creatorcontrib>Missiroli, Marcello</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ferretti, Luca</au><au>Pierazzi, Fabio</au><au>Colajanni, Michele</au><au>Marchetti, Mirco</au><au>Missiroli, Marcello</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Efficient detection of unauthorized data modification in cloud databases</atitle><btitle>2014 IEEE Symposium on Computers and Communications (ISCC)</btitle><stitle>ISCC</stitle><date>2014-06-01</date><risdate>2014</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><issn>1530-1346</issn><eissn>2642-7389</eissn><eisbn>1479942774</eisbn><eisbn>9781479942770</eisbn><abstract>Cloud services represent an unprecedented opportunity, but their adoption is hindered by confidentiality and integrity issues related to the risks of outsourcing private data to cloud providers. This paper focuses on integrity and proposes an innovative solution that allows cloud tenants to detect unauthorized modifications to outsourced data while minimizing storage and network overheads. Our approach is based on encrypted Bloom filters, and is designed to allow efficient integrity verification for databases stored in the cloud. We assess the effectiveness of the proposal as well as its performance improvements with respect to existing solutions by evaluating storage and network costs.</abstract><pub>IEEE</pub><doi>10.1109/ISCC.2014.6912574</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1530-1346
ispartof 2014 IEEE Symposium on Computers and Communications (ISCC), 2014, p.1-6
issn 1530-1346
2642-7389
language eng
recordid cdi_ieee_primary_6912574
source IEEE Xplore All Conference Series
subjects Cloud computing
Encryption
Equations
Proposals
title Efficient detection of unauthorized data modification in cloud databases
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T05%3A22%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Efficient%20detection%20of%20unauthorized%20data%20modification%20in%20cloud%20databases&rft.btitle=2014%20IEEE%20Symposium%20on%20Computers%20and%20Communications%20(ISCC)&rft.au=Ferretti,%20Luca&rft.date=2014-06-01&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.issn=1530-1346&rft.eissn=2642-7389&rft_id=info:doi/10.1109/ISCC.2014.6912574&rft.eisbn=1479942774&rft.eisbn_list=9781479942770&rft_dat=%3Cieee_CHZPO%3E6912574%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i123t-5c99aa6f4fdbbdc0381e24d4a87e7f81560bbd7ab1653919a7be1148f319c343%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6912574&rfr_iscdi=true