Loading web-font TeX/Math/Italic
Verifiable Computation over Large Database with Incremental Updates | IEEE Journals & Magazine | IEEE Xplore

Verifiable Computation over Large Database with Incremental Updates


Abstract:

The notion of verifiable database (VDB) enables a resource-constrained client to securely outsource a very large database to an untrusted server so that it could later re...Show More

Abstract:

The notion of verifiable database (VDB) enables a resource-constrained client to securely outsource a very large database to an untrusted server so that it could later retrieve a database record and update a record by assigning a new value. Also, any attempt by the server to tamper with the data will be detected by the client. When the database undergoes frequent while small modifications, the client must re-compute and update the encrypted version (ciphertext) on the server at all times. For very large data, it is extremely expensive for the resources-constrained client to perform both operations from scratch. In this paper, we formalize the notion of verifiable database with incremental updates (Inc-VDB). Besides, we propose a general Inc-VDB framework by incorporating the primitive of vector commitment and the encrypt-then-incremental MAC mode of encryption. We also present a concrete Inc-VDB scheme based on the computational Diffie-Hellman (CDH) assumption. Furthermore, we prove that our construction can achieve the desired security properties.
Published in: IEEE Transactions on Computers ( Volume: 65, Issue: 10, 01 October 2016)
Page(s): 3184 - 3195
Date of Publication: 25 December 2015

ISSN Information:

Funding Agency:

References is not available for this document.

1 Introduction

With the availability of cloud services, the techniques for securely outsourcing the prohibitively expensive computations are getting widespread attention in the scientific community. That is, the clients with resource-constraint devices can outsource the heavy computation workloads into the untrusted cloud servers and enjoy the unlimited computing resources in a pay-per-use manner. Since the cloud servers may return an invalid result in some cases, one crucial requirement of outsourcing computation is that the client has the ability to verify the validity of computation result efficiently.

Select All
1.
M. J. Atallah and K. B. Frikken, "Securely outsourcing linear algebra computations", Proc. 5th ACM Symp. Inf. Comput. Commun. Security, 2010.
2.
G. Adj, A. Menezes, T. Oliveira and F. Rodríguez-Henríquez, " Computing discrete logarithms in F_{3^{6*137}} and F_{3^{6*163}} using magma ", Proc. 5th Int. Workshop Arithmetic Finite Fields, pp. 3-22, 2015.
3.
M. J. Atallah, K. N. Pantazopoulos, J. R. Rice and E. H. Spafford, "Secure outsourcing of scientific computations", Adv. Comput., vol. 54, pp. 216-272, 2001.
4.
M. J. Atallah and J. Li, "Secure outsourcing of sequence comparisons", Int. J. Inf. Security, vol. 4, pp. 277-287, 2005.
5.
M. Blanton, "Improved conditional e-payments", Proc. 6th Int. Conf. Appl. Cryptograph. Netw. Security, pp. 188-206, 2008.
6.
D. Benjamin and M. J. Atallah, "Private and cheating-free outsourcing of algebraic computations", Proc. 6th Annu. Conf. Privacy Security Trust, pp. 240-245, 2008.
7.
F. Bao, R. Deng and H. Zhu, "Variations of Diffie-Hellman problem", Proc. 5th Int. Conf. Inf. Commun. Security, pp. 301-312, 2003.
8.
M. Backes, D. Fiore and R. M. Reischuk, "Verifiable delegation of computation on outsourced data", Proc. ACM SIGSAC Conf. Comput. Commun. Security, pp. 863-874, 2013.
9.
M. Ben-Or, S. Goldwasser, J. Kilian and A. Wigderson, "Multi-prover interactive proofs: How to remove intractability assumptions", Proc. ACM Symp. Theory Comput., pp. 113-131, 1988.
10.
M. Bellare, O. Goldreich and S. Goldwasser, "Incremental cryptography: The case of hashing and signing", Proc. 14th Annu. Int. Cryptol. Conf. Adv. Cryptol., pp. 216-233, 1994.
11.
M. Bellare, O. Goldreich and S. Goldwasser, "Incremental cryptography and application to virus protection", Proc. 27th ACM Symp. Theory Comput., pp. 45-56, 1995.
12.
E. Buonanno, J. Katz and M. Yung, "Incremental unforgeable encryption", Proc. 8th Int. Workshop Fast Softw. Encryption, pp. 109-124, 2002.
13.
M. Blum, M. Luby and R. Rubinfeld, "Program result checking against adaptive programs and in cryptographic settings", Proc. DIMACS Workshop Distrib. Comput. Crypthography, pp. 107-118, 1991.
14.
M. Blum, M. Luby and R. Rubinfeld, "Self-testing/correcting with applications to numerical problems", J. Comput. Syst. Sci., pp. 549-595, 1993.
15.
M. Bellare and D. Micciancioy, "A new paradigm for collision-free hashing: Incrementality at reduced cost", Proc. Int. Conf. Theory Appl. Cryptographic Techn., pp. 163-192, 1997.
16.
M. Blanton, M. J. Atallah, K. B. Frikken and Q. Malluhi, "Secure and efficient outsourcing of sequence comparisons", Proc. 17th Eur. Symp. Res. Comput. Security, pp. 505-522, 2012.
17.
D. Boneh, B. Lynn and H. Shacham, "Short signatures from the Weil pairings", Proc. 7th Int. Conf. Theory Appl. Cryptol. Inf. Security: Adv. Cryptol., pp. 514-532, 2001.
18.
M. Bellare and C. Namprempre, "Authenticated encryption: Relations among notions and analysis of the generic composition paradigm", Proc. 6th Int. Conf. Theory Appl. Cryptol. Inf. Security, pp. 531-545, 2000.
19.
S. Benabbas, R. Gennaro and Y. Vahlis, "Verifiable delegation of computation over large datasets", Proc. 31st Annu. Conf. Adv. Cryptol., pp. 111-131, 2011.
20.
R. A. Popa, N. Zeldovich and H. Balakrishnan, "CryptDB: A practical encrypted relational DBMS".
21.
B. Chevallier-Mames, J. Coron, N. McCullagh, D. Naccache and M. Scott, "Secure delegation of elliptic-curve pairing", Proc. 9th IFIP WG 8.8/11.2 Int. Conf. Smart Card Re. Adv. Appl., pp. 24-35, 2010.
22.
D. Catalano and D. Fiore, "Vector commitments and their applications", Proc. 16th Int. Conf. Practice Theory Public-Key Cryptography, pp. 55-72, 2013.
23.
J. Camenisch, S. Hohenberger and M. Pedersen, "Batch verification of short signatures", Proc. 26th Annu. Int. Conf. Theory Appl. Cryptographic Techn., pp. 246-263, 2007.
24.
J. Camenisch, M. Kohlweiss and C. Soriente, "An accumulator based on bilinear maps and efficient revocation for anonymous credentials", Proc. 12th Int. Conf. Practice Theory Public Key Cryptography, pp. 481-500, 2009.
25.
J. Camenisch and A. Lysyanskaya, "Dynamic accumulators and application to efficient revocation of anonymous credentials", Proc. 22nd Annu. Int. Cryptol. Conf. Adv. Cryptol., pp. 61-76, 2002.
26.
R. Canetti, B. Riva and G. Rothblum, "Practical delegation of computation using multiple servers", Proc. 18th ACM Conf. Comput. Commun. Security, pp. 445-454, 2011.
27.
B. Carbunar and M. Tripunitara, "Conditional payments for computing markets", Proc. 7th Int. Conf. Cryptol. Netw.. Security, pp. 317-331, 2008.
28.
B. Carbunar and M. Tripunitara, "Fair payments for outsourced computations", Proc. Annu. Conf. Sensor Mesh Ad Hoc Commun. Netw., pp. 529-537, 2010.
29.
X. Chen, J. Li and W. Susilo, "Efficient fair conditional payments for outsourcing computations", IEEE Trans. Inf. Forensics Security, vol. 7, no. 6, pp. 1687-1694, Dec. 2012.
30.
X. Chen, J. Li, J. Ma, Q. Tang and W. Lou, "New algorithms for secure outsourcing of modular exponentiations", Proc. Eur. Conf. Res. Comput. Security, pp. 541-556, 2012.
Contact IEEE to Subscribe

References

References is not available for this document.