Efficient verification of trustiness and authentication of query answers in cloud

Ch Mamatha Devi, V. Aditya Ramalingeswar Rao


This recommends a cooperative query answer authentication system, based on the ring signature, the Merkle hash tree (MHT) and the non-repudiable service protocol. Through the cooperation among the entities in cloud service system, the proposed scheme could not only verify the query answer but also protect the DO’s identity. First, it picks up the internal nodes of MHT to sign, as well as the root node. Thus, the verification computation complexity could be significantly reduced from O(log2N) to O(log2N0.5) in the best case. Then it improves an existing ring signature to sign the selected nodes. Furthermore, the proposed scheme employs the non-repudiation protocol during the transmission of query answer and verification object (VO) to protect trading behavior between the CSP and users. The security and performance analysis prove the security and feasibility of the proposed scheme.


D. Kwak, R. Liu, D. Kim, B. Nath, and L. Iftode, “Seeing is believing: Sharing real-time visual traffic in for mation via vehicular clouds,” IEEE Access, vol. 4, pp. 3617–3631, 2016.

Q. Yang, B. Zhu, and S. Wu, “An architecture of cloud-assisted information dissemination in vehicular networks,” IEEE Access, vol. 4, pp. 2764–2770, 2016.

N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,” IEEE Transactions on parallel and distributed systems, vol. 25, no. 1, pp. 222–233, 2014.

W. Zhang, Y. Lin, S. Xiao, J. Wu, and S. Zhou, “Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing,” IEEE Transactions on Computers, vol. 65, no. 5, pp. 1566–1577, 2016.

S.Tian,Y.Cai,andZ.Hu,“Aparity-based data outs our coming model forqueryauthenticationandcorrection,”inIEEE36thInternational Conference on Distributed Computing Systems (ICDCS). IEEE, 2016, pp. 395–404.

J. Li, A. Squicciarini, D. Lin, S. Sundareswaran, and C. Jia, “Mmbcloud-tree: Authenticated index for verifiable cloud service selection,” IEEE Transactions on Dependable and Secure Computing, vol. PP, no. 99, pp. 1–14, 2015.

H. Pang and K.-L. Tan, “Query answer authentication,” Synthesis Lectures on Data Management, vol. 4, no. 2, pp. 1–103, 2012.

F. Li, K. Yi, M. Hadjieleftheriou, and G. Kollios, “Proof-infused streams: Enabling authentication of sliding window queries on streams,” in Proceedings of the 33rd international conference on Very large data bases. VLDB Endowment, 2007, pp. 147–158.

J. K. Liu, M. H. Au, W. Susilo, and J. Zhou, “Linkable ring signature with unconditional anonymity,” IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 1, pp. 157–165, 2014.

R. C. Merkle, “A certified digital signature,” in Conference on the Theory and Application of Cryptology. Springer, 1989, pp. 218–238.

F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin, “Dynamic authenticated index structures for outsourced databases,” in Proceedings of the 2006 ACM SIGMOD international conference on Management of data. ACM, 2006, pp. 121–132.

——, “Authenticated index structures for aggregation queries,” ACM Transactions on Information and System Security (TISSEC), vol. 13, no. 4, p. 32, 2010.

F. Buccafurri, G. Lax, S. Nicolazzo, and A. Nocera, “Range query integrity in cloud data streams with efficient insertion,” in International Conference on Cryptology and Network Security. Springer, 2016, pp. 719–724.

Q. Chen, H. Hu, and J. Xu, “Authenticated online data integration services,” in Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data. ACM, 2015, pp. 167–181.

.Vyas,A.Singh,J.Singh,G.Soni,andB.Purushothama,“Design of an efficient verification scheme for correctness of outsourced computations in cloud computing,” in International Symposium on Security in Computing and Communication. Springer, 2015, pp. 66– 77.

Full Text: PDF [Full Text]


  • There are currently no refbacks.

Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.