A novel verification of trustiness and authentication of query answers in cloud

Nuni Naga Sai Satya Sandeep, Vadali Srinivas

Abstract


Propose a helpful question answer confirmation plot which applies to cloud. This plan can not just check the trustiness, culmination, legitimacy of the inquiry answers productively, yet in addition fulfill DO's prerequisite for namelessness and assurance non-revocation benefit among CSP and client. Initially, the proposed plan picks and signs the KN in the MHT dependent on the ring mark conspire, which can both confirm the right of inquiry result when keeping DO mysterious, and underpins various DOs. Also, we present a non-disavowal convention dependent on VO to unravel the repudiable practices of CSP and client.


References


D. Kwak, R. Liu, D. Kim, B. Nath, and L. Iftode, “Seeing is believing: Sharing real-time visual traffic in for mation via vehicular clouds,” IEEE Access, vol. 4, pp. 3617–3631, 2016.

Q. Yang, B. Zhu, and S. Wu, “An architecture of cloud-assisted information dissemination in vehicular networks,” IEEE Access, vol. 4, pp. 2764–2770, 2016.

N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,” IEEE Transactions on parallel and distributed systems, vol. 25, no. 1, pp. 222–233, 2014.

W. Zhang, Y. Lin, S. Xiao, J. Wu, and S. Zhou, “Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing,” IEEE Transactions on Computers, vol. 65, no. 5, pp. 1566–1577, 2016.

S.Tian,Y.Cai,andZ.Hu,“Aparity-based data outs our coming model forqueryauthenticationandcorrection,”inIEEE36thInternational Conference on Distributed Computing Systems (ICDCS). IEEE, 2016, pp. 395–404.

J. Li, A. Squicciarini, D. Lin, S. Sundareswaran, and C. Jia, “Mmbcloud-tree: Authenticated index for verifiable cloud service selection,” IEEE Transactions on Dependable and Secure Computing, vol. PP, no. 99, pp. 1–14, 2015.

H. Pang and K.-L. Tan, “Query answer authentication,” Synthesis Lectures on Data Management, vol. 4, no. 2, pp. 1–103, 2012.

F. Li, K. Yi, M. Hadjieleftheriou, and G. Kollios, “Proof-infused streams: Enabling authentication of sliding window queries on streams,” in Proceedings of the 33rd international conference on Very large data bases. VLDB Endowment, 2007, pp. 147–158.

J. K. Liu, M. H. Au, W. Susilo, and J. Zhou, “Linkable ring signature with unconditional anonymity,” IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 1, pp. 157–165, 2014.

R. C. Merkle, “A certified digital signature,” in Conference on the Theory and Application of Cryptology. Springer, 1989, pp. 218–238.

F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin, “Dynamic authenticated index structures for outsourced databases,” in Proceedings of the 2006 ACM SIGMOD international conference on Management of data. ACM, 2006, pp. 121–132.

——, “Authenticated index structures for aggregation queries,” ACM Transactions on Information and System Security (TISSEC), vol. 13, no. 4, p. 32, 2010.

F. Buccafurri, G. Lax, S. Nicolazzo, and A. Nocera, “Range query integrity in cloud data streams with efficient insertion,” in International Conference on Cryptology and Network Security. Springer, 2016, pp. 719–724.

Q. Chen, H. Hu, and J. Xu, “Authenticated online data integration services,” in Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data. ACM, 2015, pp. 167–181.

.Vyas,A.Singh,J.Singh,G.Soni,andB.Purushothama,“Design of an efficient verification scheme for correctness of outsourced computations in cloud computing,” in International Symposium on Security in Computing and Communication. Springer, 2015, pp. 66– 77.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.