Loading…
Efficient detection of unauthorized data modification in cloud databases
Cloud services represent an unprecedented opportunity, but their adoption is hindered by confidentiality and integrity issues related to the risks of outsourcing private data to cloud providers. This paper focuses on integrity and proposes an innovative solution that allows cloud tenants to detect u...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 6 |
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Ferretti, Luca Pierazzi, Fabio Colajanni, Michele Marchetti, Mirco Missiroli, Marcello |
description | Cloud services represent an unprecedented opportunity, but their adoption is hindered by confidentiality and integrity issues related to the risks of outsourcing private data to cloud providers. This paper focuses on integrity and proposes an innovative solution that allows cloud tenants to detect unauthorized modifications to outsourced data while minimizing storage and network overheads. Our approach is based on encrypted Bloom filters, and is designed to allow efficient integrity verification for databases stored in the cloud. We assess the effectiveness of the proposal as well as its performance improvements with respect to existing solutions by evaluating storage and network costs. |
doi_str_mv | 10.1109/ISCC.2014.6912574 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_6912574</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6912574</ieee_id><sourcerecordid>6912574</sourcerecordid><originalsourceid>FETCH-LOGICAL-i123t-5c99aa6f4fdbbdc0381e24d4a87e7f81560bbd7ab1653919a7be1148f319c343</originalsourceid><addsrcrecordid>eNotkM1KAzEUhaMoONY-gLjJC8yYm9wkk6UMtS0UXNh9yS8G2hmZySz06S22qwPf-TiLQ8gzsAaAmdftZ9c1nAE2ygCXGm_II6A2BrnWeEsqrpDXWrTmjlQgBatBoHogy2nKjnGlFUojK7JZpZR9jn2hIZboSx56OiQ693YuX8OYf2OgwRZLT0PIZ9X-G7mn_jjMl8rZKU5P5D7Z4xSX11yQ_ftq323q3cd6273t6gxclFp6Y6xVCVNwLngmWogcA9pWR51akIqdubYOlBQGjNUuAmCbBBgvUCzIy2U2xxgP32M-2fHncP1A_AEPb07z</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Efficient detection of unauthorized data modification in cloud databases</title><source>IEEE Xplore All Conference Series</source><creator>Ferretti, Luca ; Pierazzi, Fabio ; Colajanni, Michele ; Marchetti, Mirco ; Missiroli, Marcello</creator><creatorcontrib>Ferretti, Luca ; Pierazzi, Fabio ; Colajanni, Michele ; Marchetti, Mirco ; Missiroli, Marcello</creatorcontrib><description>Cloud services represent an unprecedented opportunity, but their adoption is hindered by confidentiality and integrity issues related to the risks of outsourcing private data to cloud providers. This paper focuses on integrity and proposes an innovative solution that allows cloud tenants to detect unauthorized modifications to outsourced data while minimizing storage and network overheads. Our approach is based on encrypted Bloom filters, and is designed to allow efficient integrity verification for databases stored in the cloud. We assess the effectiveness of the proposal as well as its performance improvements with respect to existing solutions by evaluating storage and network costs.</description><identifier>ISSN: 1530-1346</identifier><identifier>EISSN: 2642-7389</identifier><identifier>EISBN: 1479942774</identifier><identifier>EISBN: 9781479942770</identifier><identifier>DOI: 10.1109/ISCC.2014.6912574</identifier><language>eng</language><publisher>IEEE</publisher><subject>Cloud computing ; Encryption ; Equations ; Proposals</subject><ispartof>2014 IEEE Symposium on Computers and Communications (ISCC), 2014, p.1-6</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6912574$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,23930,23931,25140,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6912574$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Ferretti, Luca</creatorcontrib><creatorcontrib>Pierazzi, Fabio</creatorcontrib><creatorcontrib>Colajanni, Michele</creatorcontrib><creatorcontrib>Marchetti, Mirco</creatorcontrib><creatorcontrib>Missiroli, Marcello</creatorcontrib><title>Efficient detection of unauthorized data modification in cloud databases</title><title>2014 IEEE Symposium on Computers and Communications (ISCC)</title><addtitle>ISCC</addtitle><description>Cloud services represent an unprecedented opportunity, but their adoption is hindered by confidentiality and integrity issues related to the risks of outsourcing private data to cloud providers. This paper focuses on integrity and proposes an innovative solution that allows cloud tenants to detect unauthorized modifications to outsourced data while minimizing storage and network overheads. Our approach is based on encrypted Bloom filters, and is designed to allow efficient integrity verification for databases stored in the cloud. We assess the effectiveness of the proposal as well as its performance improvements with respect to existing solutions by evaluating storage and network costs.</description><subject>Cloud computing</subject><subject>Encryption</subject><subject>Equations</subject><subject>Proposals</subject><issn>1530-1346</issn><issn>2642-7389</issn><isbn>1479942774</isbn><isbn>9781479942770</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2014</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotkM1KAzEUhaMoONY-gLjJC8yYm9wkk6UMtS0UXNh9yS8G2hmZySz06S22qwPf-TiLQ8gzsAaAmdftZ9c1nAE2ygCXGm_II6A2BrnWeEsqrpDXWrTmjlQgBatBoHogy2nKjnGlFUojK7JZpZR9jn2hIZboSx56OiQ693YuX8OYf2OgwRZLT0PIZ9X-G7mn_jjMl8rZKU5P5D7Z4xSX11yQ_ftq323q3cd6273t6gxclFp6Y6xVCVNwLngmWogcA9pWR51akIqdubYOlBQGjNUuAmCbBBgvUCzIy2U2xxgP32M-2fHncP1A_AEPb07z</recordid><startdate>20140601</startdate><enddate>20140601</enddate><creator>Ferretti, Luca</creator><creator>Pierazzi, Fabio</creator><creator>Colajanni, Michele</creator><creator>Marchetti, Mirco</creator><creator>Missiroli, Marcello</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>20140601</creationdate><title>Efficient detection of unauthorized data modification in cloud databases</title><author>Ferretti, Luca ; Pierazzi, Fabio ; Colajanni, Michele ; Marchetti, Mirco ; Missiroli, Marcello</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i123t-5c99aa6f4fdbbdc0381e24d4a87e7f81560bbd7ab1653919a7be1148f319c343</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Cloud computing</topic><topic>Encryption</topic><topic>Equations</topic><topic>Proposals</topic><toplevel>online_resources</toplevel><creatorcontrib>Ferretti, Luca</creatorcontrib><creatorcontrib>Pierazzi, Fabio</creatorcontrib><creatorcontrib>Colajanni, Michele</creatorcontrib><creatorcontrib>Marchetti, Mirco</creatorcontrib><creatorcontrib>Missiroli, Marcello</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ferretti, Luca</au><au>Pierazzi, Fabio</au><au>Colajanni, Michele</au><au>Marchetti, Mirco</au><au>Missiroli, Marcello</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Efficient detection of unauthorized data modification in cloud databases</atitle><btitle>2014 IEEE Symposium on Computers and Communications (ISCC)</btitle><stitle>ISCC</stitle><date>2014-06-01</date><risdate>2014</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><issn>1530-1346</issn><eissn>2642-7389</eissn><eisbn>1479942774</eisbn><eisbn>9781479942770</eisbn><abstract>Cloud services represent an unprecedented opportunity, but their adoption is hindered by confidentiality and integrity issues related to the risks of outsourcing private data to cloud providers. This paper focuses on integrity and proposes an innovative solution that allows cloud tenants to detect unauthorized modifications to outsourced data while minimizing storage and network overheads. Our approach is based on encrypted Bloom filters, and is designed to allow efficient integrity verification for databases stored in the cloud. We assess the effectiveness of the proposal as well as its performance improvements with respect to existing solutions by evaluating storage and network costs.</abstract><pub>IEEE</pub><doi>10.1109/ISCC.2014.6912574</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1530-1346 |
ispartof | 2014 IEEE Symposium on Computers and Communications (ISCC), 2014, p.1-6 |
issn | 1530-1346 2642-7389 |
language | eng |
recordid | cdi_ieee_primary_6912574 |
source | IEEE Xplore All Conference Series |
subjects | Cloud computing Encryption Equations Proposals |
title | Efficient detection of unauthorized data modification in cloud databases |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T05%3A22%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Efficient%20detection%20of%20unauthorized%20data%20modification%20in%20cloud%20databases&rft.btitle=2014%20IEEE%20Symposium%20on%20Computers%20and%20Communications%20(ISCC)&rft.au=Ferretti,%20Luca&rft.date=2014-06-01&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.issn=1530-1346&rft.eissn=2642-7389&rft_id=info:doi/10.1109/ISCC.2014.6912574&rft.eisbn=1479942774&rft.eisbn_list=9781479942770&rft_dat=%3Cieee_CHZPO%3E6912574%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i123t-5c99aa6f4fdbbdc0381e24d4a87e7f81560bbd7ab1653919a7be1148f319c343%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6912574&rfr_iscdi=true |