DocumentCode :
610348
Title :
Trustworthy data from untrusted databases
Author :
Jain, R. ; Prabhakar, Sanjay
Author_Institution :
Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA
fYear :
2013
fDate :
8-12 April 2013
Firstpage :
529
Lastpage :
540
Abstract :
Ensuring the trustworthiness of data retrieved from a database is of utmost importance to users. The correctness of data stored in a database is defined by the faithful execution of only valid (authorized) transactions. In this paper we address the question of whether it is necessary to trust a database server in order to trust the data retrieved from it. The lack of trust arises naturally if the database server is owned by a third party, as in the case of cloud computing. It also arises if the server may have been compromised, or there is a malicious insider. In particular, we reduce the level of trust necessary in order to establish the authenticity and integrity of data at an untrusted server. Earlier work on this problem is limited to situations where there are no updates to the database, or all updates are authorized and vetted by a central trusted entity. This is an unreasonable assumption for a truly dynamic database, as would be expected in many business applications, where multiple clients can update data without having to check with a central server that approves of their changes. We identify the problem of ensuring trustworthiness of data at an untrusted server in the presence of transactional updates that run directly on the database, and develop the first solutions to this problem. Our solutions also provide indemnity for an honest server and assured provenance for all updates to the data. We implement our solution in a prototype system built on top of Oracle with no modifications to the database internals. We also provide an empirical evaluation of the proposed solutions and establish their feasibility.
Keywords :
authorisation; business data processing; cloud computing; data integrity; database management systems; file servers; information retrieval; trusted computing; business applications; central server; cloud computing; data authenticity; data integrity; data retrieved trustworthiness; data storage; database server; malicious insider; prototype system; transactional updates; truly dynamic database; trust level; trustworthy data; unreasonable assumption; untrusted databases; untrusted server; Cloud computing; Databases; Digital signatures; Hardware; Protocols; Servers;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Data Engineering (ICDE), 2013 IEEE 29th International Conference on
Conference_Location :
Brisbane, QLD
ISSN :
1063-6382
Print_ISBN :
978-1-4673-4909-3
Electronic_ISBN :
1063-6382
Type :
conf
DOI :
10.1109/ICDE.2013.6544853
Filename :
6544853
Link To Document :
بازگشت