Loading...

Indexing Based Search on Encrypted Outsourced Data

Habibi, Ali | 2020

317 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 52846 (19)
  4. University: Sharif University of Technology
  5. Department: Computer Engineering
  6. Advisor(s): Jalili, Rasool
  7. Abstract:
  8. Data outsourcing is a process that delegates storage, retrieval, and management of data to an external storage service provider. Data outsourcing will create security challenges for data owners despite decreasing the costs. The most important security challenges in this process are to maintain the confidentiality of data in order to prevent the server's access to information and to ensure that data retrieved from the server is correct. Numerous studies have been conducted to address each of these concerns, each with specific capabilities and overheads. The presented methods generally support some parts of the database's functionality, and feature enhancement in them is along with an increase in overhead. Indexing-based methods are generally provided to protect the confidentiality of data. Applying these methods requires another approach to ensure the accuracy of the received response, which imposes a separate overhead. Proposed solutions to ensure the integrity of received response, face the problem of verification data storage. verification data storage in the client will cause problems due to limited storage space. The storage in the server also increases the communication overhead caused by the data transfer and allows the server to manipulate.In this thesis, we propose a solution to ensure that the received response from the server is correct, which requires little storage space by storing the verification data on the client-side, while not imposing a communication overhead and preventing the server from manipulating the verification data. This solution consists of three approaches that work best for different outsourcing conditions. The proposed solution, in addition to verification of the integrity of the query response, provides data confidentiality under a single presentation method. Using an operation to construct verification data coupled with bucketing will reduce the computational overheads of outsourcing time. Also, in query time, an index and bucket finding operation with response verification will reduce the computational overhead of the client. In order to evaluate the proposed solution, storage space usage, verification accuracy, and efficiency have been investigated, and the results indicate the ability to use this solution in real environments
  9. Keywords:
  10. Data Outsourcing ; Indexing ; Confidentiality ; Integrity Conditions

 Digital Object List

 Bookmark

No TOC