{"title":"云数据库即服务中的数据完整性评估","authors":"Puya Ghazizadeh, R. Mukkamala, S. Olariu","doi":"10.1109/SERVICES.2013.40","DOIUrl":null,"url":null,"abstract":"Data integrity is a major concern in outsourced IT services like cloud computing. Cloud computing has become popular because of cost reductions, time saving and mobility in service. However data integrity is still an unresolved issue in cloud services. We present an efficient mechanism for evaluating data integrity in cloud database-as-a-service. Our approach is based on inserting fake tuples into the database. In our model the owner of the data is the only trusted party and the server as a service provider or any other users are not trusted. We refer to distrusted party as a potentially malicious attacker. In our approach we define generating functions to create fake tuples with uniform distribution. Malicious attackers are not able to distinguish between fake tuples and real tuples. Our approach does not use encryption which makes it more efficient. We explore the strengths and limitations of these generating functions by describing our approach.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"25","resultStr":"{\"title\":\"Data Integrity Evaluation in Cloud Database-as-a-Service\",\"authors\":\"Puya Ghazizadeh, R. Mukkamala, S. Olariu\",\"doi\":\"10.1109/SERVICES.2013.40\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data integrity is a major concern in outsourced IT services like cloud computing. Cloud computing has become popular because of cost reductions, time saving and mobility in service. However data integrity is still an unresolved issue in cloud services. We present an efficient mechanism for evaluating data integrity in cloud database-as-a-service. Our approach is based on inserting fake tuples into the database. In our model the owner of the data is the only trusted party and the server as a service provider or any other users are not trusted. We refer to distrusted party as a potentially malicious attacker. In our approach we define generating functions to create fake tuples with uniform distribution. Malicious attackers are not able to distinguish between fake tuples and real tuples. Our approach does not use encryption which makes it more efficient. We explore the strengths and limitations of these generating functions by describing our approach.\",\"PeriodicalId\":169370,\"journal\":{\"name\":\"2013 IEEE Ninth World Congress on Services\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-06-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"25\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 IEEE Ninth World Congress on Services\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SERVICES.2013.40\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE Ninth World Congress on Services","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SERVICES.2013.40","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data Integrity Evaluation in Cloud Database-as-a-Service
Data integrity is a major concern in outsourced IT services like cloud computing. Cloud computing has become popular because of cost reductions, time saving and mobility in service. However data integrity is still an unresolved issue in cloud services. We present an efficient mechanism for evaluating data integrity in cloud database-as-a-service. Our approach is based on inserting fake tuples into the database. In our model the owner of the data is the only trusted party and the server as a service provider or any other users are not trusted. We refer to distrusted party as a potentially malicious attacker. In our approach we define generating functions to create fake tuples with uniform distribution. Malicious attackers are not able to distinguish between fake tuples and real tuples. Our approach does not use encryption which makes it more efficient. We explore the strengths and limitations of these generating functions by describing our approach.