Skip to main content

Employing Bloom Filters for Enforcing Integrity of Outsourced Databases in Cloud Environments

  • Conference paper
Advances in Computing and Communications (ACC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 190))

Included in the following conference series:

  • 1777 Accesses

Abstract

With the ever increasing growth of cloud computing and the resulting outsourcing of data, concerns of data integrity, security, and privacy are also on the rise. Among these, evidence of data integrity, i.e., being tamper-evident and current, seem to be of immediate concern. While several integrity techniques currently exist, most result in significant overhead at the database owner site. For clients with large databases, these are not viable solutions. In this paper, we propose a computationally efficient alternative—database integrity with Bloom filters. We focus both on the tamper-evidence and freshness properties of the database as well as completeness of query results. We propose two schemes for integrity enforcement—first using aggregates signatures and second using authenticated data structures. We provide detailed analysis and experimental results to prove their efficiency and correctness. The results are compared with the traditional security hash functions such as SHA-1 and are shown to be computationally efficient. We have also implemented the schemes on multiprocessor systems which show further reduction in the execution time. Our results clearly demonstrate the feasibility and efficacy of employing Bloom filters to enforce integrity for outsourced databases in cloud environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Tanebaum, A.S., Wetherall, D.J.: Computer Networks, 5th edn. Pearson Higher Education, London (2011)

    Google Scholar 

  2. Peng, J., Zhou, Y., Yang, Y.: Cyclic redundancy code checking based on small lookup table. In: IEEE Intl. Conf. on Communication Technology and Applications, pp. 596–599 (2010)

    Google Scholar 

  3. Gassend, B., Suh, G.E., Clarke, D., van Dijk, M., Devdas, S.: Caches and Merkle trees for efficient memory integrity verification. In: 9th Intl. Symp. High Performnace Computer Architecture (February 2003)

    Google Scholar 

  4. Silberschatz, A., Galvin, P.B., Gane, G.: Operating System Concepts, 8th edn. Wiley, Chichester (2009)

    MATH  Google Scholar 

  5. Gagliardi, R., Marcantoni, F., Polzonetti, A., Re, B., Tapanelli, P.: Cloud computing for network business ecosystem. In: IEEE Intl. Conf. Industrial Engineering and Engineering Managament (IEEM), pp. 862–868 (December 2010)

    Google Scholar 

  6. Gurman, J.B.: How many terabytes was that? Archiving and serving solar space data without losing your shirt. Bulletin of the American Astronomical Society 31, 955 (1999)

    Google Scholar 

  7. Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.: Authentic data publication over the internet. Journal of Computer Security 11(3), 291–314 (2003)

    Article  MATH  Google Scholar 

  8. Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Proceedings of ACM SIGMOD International Conference on Management of Data, pp. 121–132 (2006)

    Google Scholar 

  9. Yun, A., Shi, C., Kim, Y.: On protecting integrity and confidentiality of cryptographic file system for outsourced storage. In: CCSW 2009 (November 2009)

    Google Scholar 

  10. Goodrich, M.T., Papamanthou, C., Tamassia, R., Triandopoulos, N.: Athos: Efficient authentication of outsourced file systems. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 80–96. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  11. Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. CACM 13(7), 422–426 (1970)

    Article  MATH  Google Scholar 

  12. Chang, F., Dean, J., Ghemawat, S., Hseih, W.C., Wallach, D.A., Burrows, M., Chandra, T., Fikes, A., Gruber, R.: Bigtable: A distributed data storage system for structured data. In: Proc. 7th Symp. Operating Systems Design and Implementation (OSDI 2006), pp. 205–218 (2006)

    Google Scholar 

  13. Kumar, A., Xu, J., Li, L., Wang, J.: Space-code Bloom filters for efficient traffic flow measurement. IEEE J. Selected Areas in Communication 24(12), 2327–2339 (2006)

    Article  Google Scholar 

  14. Li, Z., Gong, G.: On data aggregation with secure Bloom filter in wireless sensor networks. Technical Report, Dept. of Electrical and Computer Engineering, Univ. Waterloo, Canada

    Google Scholar 

  15. Telidevara, A., Chandrasekaran, V., Srinivasan, A., Mukkamala, R., Gampa, S.: Similarity coefficient generators for network forensics. In: Proc. IEEE WIFS (2010)

    Google Scholar 

  16. Jian-ming, F., Ying, X., Hui-jun, X., Wei, W.: Strategy optimization for P2P security using Bloom filter. In: Intl. Conf. Multimedia Information Networking and Security, MINES 2009, pp. 403–406 (2009)

    Google Scholar 

  17. Quinn, M.J.: Parallel Programming in C with MP and OpenMP. McGraw-Hill, New York (2004)

    Google Scholar 

  18. Xie, M., Wang, H., Yin, J., Meng, X.: Integrity Auditing of Outsourced Data. In: VLDB (2007)

    Google Scholar 

  19. Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. In: NDSS. The Internet Society, San Diego (2004)

    Google Scholar 

  20. Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: SIGMOD Conference, pp. 121–132. ACM, New York (2006)

    Google Scholar 

  21. Goodrich, M.T., Tamassia, R., Triandopoulos, N.: Super-efficient verification of dynamic outsourced databases. In: RSA Conference, CRYPTO Track (2008)

    Google Scholar 

  22. Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphism. In: Foundations of Secure Computation, pp. 169–170 (1978)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Aditya, T., Baruah, P.K., Mukkamala, R. (2011). Employing Bloom Filters for Enforcing Integrity of Outsourced Databases in Cloud Environments. In: Abraham, A., Lloret Mauri, J., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 190. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22709-7_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22709-7_44

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22708-0

  • Online ISBN: 978-3-642-22709-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics