Super-efficient verification of dynamic outsourced databases

Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

38 Scopus citations

Abstract

We develop new algorithmic and cryptographic techniques for authenticating the results of queries over databases that are outsourced to an untrusted responder. We depart from previous approaches by considering super-efficient answer verification, where answers to queries are validated in time asymptotically less that the time spent to produce them and using lightweight cryptographic operations. We achieve this property by adopting the decoupling of query answering and answer verification in a way designed for queries related to range search. Our techniques allow for efficient updates of the database and protect against replay attacks performed by the responder. One such technique uses an off-line audit mechanism: the data source and the user keep digests of the sequence of operations, yet are able to jointly audit the responder to determine if a replay attack has occurred since the last audit.

Original languageEnglish
Title of host publicationTopics in Cryptology - CT-RSA 2008 - The Cryptographers' Track at the RSA Conference 2008, Proceedings
Pages407-424
Number of pages18
DOIs
StatePublished - 2008
EventCryptographers' Track at the RSA Conference, CT-RSA 2008 - San Francisco, CA, United States
Duration: 8 Apr 200811 Apr 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4964 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceCryptographers' Track at the RSA Conference, CT-RSA 2008
Country/TerritoryUnited States
CitySan Francisco, CA
Period8/04/0811/04/08

Fingerprint

Dive into the research topics of 'Super-efficient verification of dynamic outsourced databases'. Together they form a unique fingerprint.

Cite this