Verifiable outsourced database in the cloud using game theory

Faryed Eltayesh, Jamal Bentahar

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In the verifiable database (VDB) model, a computationally weak client (database owner) delegates his database management to a database service provider on the cloud, which is considered untrusted third party, while users can query the data and verify the integrity of query results. Since the process can be computationally costly and has a limited support for sophisticated query types such as aggregated queries, we propose in this paper a framework that helps bridge the gap between security and practicality trade-offs. The proposed framework remodels the verifiable database problem using Stackelberg security game. In the new model, the database owner creates and uploads to the database service provider the database and its authentication structure (AS). Next, the game is played between the defender (verifier), who is a trusted party to the database owner and runs scheduled randomized verifications using Stackelberg mixed strategy, and the database service provider. The idea is to randomize the verification schedule in an optimized way that grants the optimal payoff for the verifier while making it extremely hard for the database service provider or any attacker to figure out which part of the database is being verified next. We have implemented and compared the proposed model performance with a uniform randomization model. Simulation results show that the proposed model outperforms the uniform randomization model. Furthermore, we have evaluated the efficiency of the proposed model against different cost metrics.

Original languageBritish English
Title of host publication32nd Annual ACM Symposium on Applied Computing, SAC 2017
Pages370-377
Number of pages8
ISBN (Electronic)9781450344869
DOIs
StatePublished - 3 Apr 2017
Event32nd Annual ACM Symposium on Applied Computing, SAC 2017 - Marrakesh, Morocco
Duration: 4 Apr 20176 Apr 2017

Publication series

NameProceedings of the ACM Symposium on Applied Computing
VolumePart F128005

Conference

Conference32nd Annual ACM Symposium on Applied Computing, SAC 2017
Country/TerritoryMorocco
CityMarrakesh
Period4/04/176/04/17

Keywords

  • Authenticated data structures
  • Big databases security in the cloud
  • Database auditing
  • Outsourced database security
  • Verifiable database

Fingerprint

Dive into the research topics of 'Verifiable outsourced database in the cloud using game theory'. Together they form a unique fingerprint.

Cite this