z-logo
open-access-imgOpen Access
VOTE: Verifiable Auditing for Outsourced Database with Token Enforced Cloud Storage
Author(s) -
Geeta C Mara,
B N Rashmi,
R C Nikhil,
Rajkumar Buyya,
K R Venugopal
Publication year - 2019
Publication title -
international journal of engineering and advanced technology
Language(s) - English
Resource type - Journals
ISSN - 2249-8958
DOI - 10.35940/ijeat.b3930.129219
Subject(s) - bloom filter , computer science , cloud computing , database , merkle tree , overhead (engineering) , cloud storage , security token , computer security , trusted third party , computer network , audit , verifiable secret sharing , hash function , set (abstract data type) , cryptographic hash function , business , accounting , operating system , programming language
Database deploying is one of the remarkable utilities in cloud computing where the Information Proprietor (IP) assigns the database administration to the Cloud Service Provider (CSP) in order to lower the administration overhead and preservation expenditures of the database. Regardless of its overwhelming advantages, it experiences few security problems such as confidentiality of deployed database and auditability of search outcome. In recent past, survey has been carried out on the auditability of search outcome of deployed database that gives preciseness and intactness of search outcome. But in the prevailing schemes, since there is flow of data between IP and the clients repeatedly, huge communication cost is incurred at the Information Proprietor side. To address this challenge, we introduce Verifiable Auditing of Outsourced Database with Token Enforced Cloud Storage (VOTE) mechanism based on Merkle Hash Tree (MHT), Invertible Bloom Filter(IBF) and Counting Bloom Filter(CBF). The proposed scheme reduces the huge communication cost at the Information Proprietor side and achieves preciseness and intactness of the search outcome. Experimental analysis show that the proposed scheme has totally reduced the huge communication cost at the Information Proprietor side, and simultaneously achieves the preciseness and intactness of search outcome though the semi- trusted CSP deliberately sends a null set.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here