Lecture notes on cloud computing IV b. Tech-1 st semester prepared by



Download 1.49 Mb.
View original pdf
Page69/112
Date07.03.2022
Size1.49 Mb.
#58379
1   ...   65   66   67   68   69   70   71   72   ...   112
CC LECTURE NOTES
english grammar pdf 60
Query Integrity Assurance.


In addition to data privacy, an important security concern in the database outsourcing paradigm is query integrity. Query integrity examines the trustworthiness of the hosting environment.




64

When a client receives a query result from the service provider, it wants to be assured that the result is both correct and complete, where correct means that the result must originate in the owners data and not has been tampered with, and complete means that the result includes all records satisfying the query.
Data Integrity in Untrustworthy Storage

While the transparent cloud provides flexible utility of network-based resources, the fear of loss of control on their data is one of the major concerns that prevent end users from migrating to cloud storage services.

Actually it is a potential risk that the storage infrastructure providers become self-interested, untrustworthy, or even malicious.

There are different motivations whereby a storage service provider could become untrustworthy—for instance, to cover the consequence of a mistake in operation, or deny the vulnerability in the system after the data have been stolen by an adversary. This section introduces two technologies to enable data owners to verify the data integrity while the files are stored in the remote untrustworthy storage services.

Note that the verifier could be either the data owner or a trusted third party, and the prover could be the storage service provider or storage medium owner or system administrator.

Requirement #1. It should not be a pre-
requirement that the verifier has to possess a
complete copy of the data to be checked. And in
practice, it does not make sense fora verifier to
keep a duplicated copy of the content to be
verified. As long as it serves the purpose well,
storing a more concise contents digest of the
data at the verifier should be enough.



65

Requirement #2. The protocol has to be very robust considering the untrustworthy prover. A malicious prover is motivated to hide the violation of data integrity. The protocol should be robust enough that such a prover ought to fail in convincing the verifier.

Requirement #3. The amount of information exchanged during the verification operation should not lead to high communication overhead.

Requirement
#4. The protocol should be computationally efficient.

Requirement #5. It ought to be possible to run the verification an unlimited number of times.

Download 1.49 Mb.

Share with your friends:
1   ...   65   66   67   68   69   70   71   72   ...   112




The database is protected by copyright ©ininet.org 2024
send message

    Main page