Netinfo Security ›› 2020, Vol. 20 ›› Issue (2): 91-97.doi: 10.3969/j.issn.1671-1122.2020.02.012

• 理论研究 • Previous Articles     Next Articles

Outsourcing Database Join Query Verification Scheme Based on Authentication Tree

HOU Lin, FENG Da(), XUAN Pengkai, ZHOU Fucai   

  1. Software College of Northeastern University, Shenyang 110169, China
  • Received:2019-10-23 Online:2020-02-10 Published:2020-05-11

Abstract:

While outsourcing database is widely used, its security is greatly challenged. Users cannot guarantee the correctness and integrity of the query results when querying data. Aiming at the problem that the existing outsourcing databases can not support connection query verification, this paper proposes a connection query verification model based on authentication tree, and gives the formal definition of the model and the definition of the correctness and security of the model. This paper uses bilinear map accumulator, authentication tree and other technologies to build a connection query verification scheme of outsourcing database based on authentication tree, and uses the VBDHE and q-BSDH difficulty assumption of cryptography to give the security analysis. This paper proves that the adversary can’t make the verification pass by falsifying the wrong results, thus proving the correctness of the scheme. Experimental results and performance analysis show that the proposed scheme has higher efficiency than other schemes in key generation, query verification, communication overhead, storage overhead, etc.

Key words: outsourcing database, verifiable set operation, authentication tree, join query

CLC Number: