Ontology type: schema:ScholarlyArticle
2017-07-27
AUTHORSGang Sheng, Chunming Tang, Hongyan Han, Wei Gao, Xing Hu
ABSTRACTStoring the large-scale data on the cloud server side becomes nowadays an alternative for the data owner with the popularity and maturity of the cloud computing technique, where the data owner can manage the data with limited resources, and the user issues the query request to the cloud server instead of the data owner. As the server is not completely trusted, it is necessary for the user to perform results authentication to check whether or not the returned results from the cloud server are correct. We investigate in this paper how to perform efficient data update for the result authentication of the outsourced univariate linear function query. We seek to outsource almost all the data and computing to the server, and as few data and computations as possible are stored and performed on the data owner side, respectively. We present a novel scheme to achieve the security goal, which is divided into two parts. The first part is a verification algorithm for the outsourced computing of line intersections, which enables the data owner to store most of the data on the server side, and to execute less of the computing of the line intersections. The second part is an authentication data structure Two Level Merkle B Tree for the outsourced univariate linear function query, where the top level is used to index the user input and authenticate the query results, and the bottom level is used to index the query condition and authenticate the query results. The authentication data structure enables the data owner to update the data efficiently, and to implement the query on the server side. The theoretic analysis shows that our proposed scheme works with higher efficiency. More... »
PAGES10031-10039
http://scigraph.springernature.com/pub.10.1007/s10586-017-1064-4
DOIhttp://dx.doi.org/10.1007/s10586-017-1064-4
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1090907082
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Data Format",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "College of Mathematics and Information Science, Guangzhou University, Guangzhou, China",
"id": "http://www.grid.ac/institutes/grid.411863.9",
"name": [
"College of Mathematics and Information Science, Guangzhou University, Guangzhou, China"
],
"type": "Organization"
},
"familyName": "Sheng",
"givenName": "Gang",
"id": "sg:person.013643771071.62",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013643771071.62"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "College of Mathematics and Information Science, Guangzhou University, Guangzhou, China",
"id": "http://www.grid.ac/institutes/grid.411863.9",
"name": [
"College of Mathematics and Information Science, Guangzhou University, Guangzhou, China"
],
"type": "Organization"
},
"familyName": "Tang",
"givenName": "Chunming",
"id": "sg:person.015043074604.81",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015043074604.81"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "School of Mathematics Science, Liaocheng University, Liaocheng, China",
"id": "http://www.grid.ac/institutes/grid.411351.3",
"name": [
"School of Mathematics Science, Liaocheng University, Liaocheng, China"
],
"type": "Organization"
},
"familyName": "Han",
"givenName": "Hongyan",
"id": "sg:person.010040202763.53",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010040202763.53"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "School of Mathematics and Statistics Science, Ludong University, Yantai, China",
"id": "http://www.grid.ac/institutes/grid.443651.1",
"name": [
"School of Mathematics and Statistics Science, Ludong University, Yantai, China"
],
"type": "Organization"
},
"familyName": "Gao",
"givenName": "Wei",
"id": "sg:person.011122715333.10",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011122715333.10"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "School of Mathematics and Computational Science, Hunan University of Science and Technology, Xiangtan, China",
"id": "http://www.grid.ac/institutes/grid.411429.b",
"name": [
"School of Mathematics and Computational Science, Hunan University of Science and Technology, Xiangtan, China"
],
"type": "Organization"
},
"familyName": "Hu",
"givenName": "Xing",
"id": "sg:person.012750632275.10",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012750632275.10"
],
"type": "Person"
}
],
"citation": [
{
"id": "sg:pub.10.1007/978-3-540-30576-7_15",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1023468933",
"https://doi.org/10.1007/978-3-540-30576-7_15"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s00778-008-0113-2",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1028302855",
"https://doi.org/10.1007/s00778-008-0113-2"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-319-45744-4_13",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1043254882",
"https://doi.org/10.1007/978-3-319-45744-4_13"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-319-46298-1_23",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1052976045",
"https://doi.org/10.1007/978-3-319-46298-1_23"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/0-306-47008-x_9",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1025416644",
"https://doi.org/10.1007/0-306-47008-x_9"
],
"type": "CreativeWork"
}
],
"datePublished": "2017-07-27",
"datePublishedReg": "2017-07-27",
"description": "Storing the large-scale data on the cloud server side becomes nowadays an alternative for the data owner with the popularity and maturity of the cloud computing technique, where the data owner can manage the data with limited resources, and the user issues the query request to the cloud server instead of the data owner. As the server is not completely trusted, it is necessary for the user to perform results authentication to check whether or not the returned results from the cloud server are correct. We investigate in this paper how to perform efficient data update for the result authentication of the outsourced univariate linear function query. We seek to outsource almost all the data and computing to the server, and as few data and computations as possible are stored and performed on the data owner side, respectively. We present a novel scheme to achieve the security goal, which is divided into two parts. The first part is a verification algorithm for the outsourced computing of line intersections, which enables the data owner to store most of the data on the server side, and to execute less of the computing of the line intersections. The second part is an authentication data structure Two Level Merkle B Tree for the outsourced univariate linear function query, where the top level is used to index the user input and authenticate the query results, and the bottom level is used to index the query condition and authenticate the query results. The authentication data structure enables the data owner to update the data efficiently, and to implement the query on the server side. The theoretic analysis shows that our proposed scheme works with higher efficiency.",
"genre": "article",
"id": "sg:pub.10.1007/s10586-017-1064-4",
"isAccessibleForFree": false,
"isFundedItemOf": [
{
"id": "sg:grant.7179489",
"type": "MonetaryGrant"
}
],
"isPartOf": [
{
"id": "sg:journal.1046649",
"issn": [
"1386-7857",
"1573-7543"
],
"name": "Cluster Computing",
"publisher": "Springer Nature",
"type": "Periodical"
},
{
"issueNumber": "Suppl 4",
"type": "PublicationIssue"
},
{
"type": "PublicationVolume",
"volumeNumber": "22"
}
],
"keywords": [
"data owners",
"server side",
"function queries",
"cloud server",
"query results",
"efficient data update",
"data owner side",
"authentication data structure",
"cloud computing techniques",
"cloud server side",
"large-scale data",
"outsourced computing",
"line intersections",
"query requests",
"query conditions",
"efficient updates",
"data update",
"verification algorithm",
"user input",
"computing techniques",
"owner side",
"security goals",
"data structure",
"B-tree",
"server",
"queries",
"authentication",
"novel scheme",
"computing",
"theoretic analysis",
"users",
"bottom level",
"limited resources",
"top level",
"scheme",
"owners",
"update",
"algorithm",
"requests",
"computation",
"popularity",
"data",
"intersection",
"resources",
"high efficiency",
"input",
"trees",
"goal",
"first part",
"second part",
"technique",
"efficiency",
"part",
"results",
"alternative",
"side",
"analysis",
"structure",
"maturity",
"levels",
"conditions",
"paper"
],
"name": "Authentication of outsourced linear function query with efficient updates",
"pagination": "10031-10039",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1090907082"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/s10586-017-1064-4"
]
}
],
"sameAs": [
"https://doi.org/10.1007/s10586-017-1064-4",
"https://app.dimensions.ai/details/publication/pub.1090907082"
],
"sdDataset": "articles",
"sdDatePublished": "2022-08-04T17:05",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-springernature-scigraph/baseset/20220804/entities/gbq_results/article/article_722.jsonl",
"type": "ScholarlyArticle",
"url": "https://doi.org/10.1007/s10586-017-1064-4"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s10586-017-1064-4'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s10586-017-1064-4'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s10586-017-1064-4'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s10586-017-1064-4'
This table displays all metadata directly associated to this object as RDF triples.
178 TRIPLES
21 PREDICATES
91 URIs
78 LITERALS
6 BLANK NODES
Subject | Predicate | Object | |
---|---|---|---|
1 | sg:pub.10.1007/s10586-017-1064-4 | schema:about | anzsrc-for:08 |
2 | ″ | ″ | anzsrc-for:0804 |
3 | ″ | schema:author | N13373476b29e41c4afe6a4248ca2011b |
4 | ″ | schema:citation | sg:pub.10.1007/0-306-47008-x_9 |
5 | ″ | ″ | sg:pub.10.1007/978-3-319-45744-4_13 |
6 | ″ | ″ | sg:pub.10.1007/978-3-319-46298-1_23 |
7 | ″ | ″ | sg:pub.10.1007/978-3-540-30576-7_15 |
8 | ″ | ″ | sg:pub.10.1007/s00778-008-0113-2 |
9 | ″ | schema:datePublished | 2017-07-27 |
10 | ″ | schema:datePublishedReg | 2017-07-27 |
11 | ″ | schema:description | Storing the large-scale data on the cloud server side becomes nowadays an alternative for the data owner with the popularity and maturity of the cloud computing technique, where the data owner can manage the data with limited resources, and the user issues the query request to the cloud server instead of the data owner. As the server is not completely trusted, it is necessary for the user to perform results authentication to check whether or not the returned results from the cloud server are correct. We investigate in this paper how to perform efficient data update for the result authentication of the outsourced univariate linear function query. We seek to outsource almost all the data and computing to the server, and as few data and computations as possible are stored and performed on the data owner side, respectively. We present a novel scheme to achieve the security goal, which is divided into two parts. The first part is a verification algorithm for the outsourced computing of line intersections, which enables the data owner to store most of the data on the server side, and to execute less of the computing of the line intersections. The second part is an authentication data structure Two Level Merkle B Tree for the outsourced univariate linear function query, where the top level is used to index the user input and authenticate the query results, and the bottom level is used to index the query condition and authenticate the query results. The authentication data structure enables the data owner to update the data efficiently, and to implement the query on the server side. The theoretic analysis shows that our proposed scheme works with higher efficiency. |
12 | ″ | schema:genre | article |
13 | ″ | schema:isAccessibleForFree | false |
14 | ″ | schema:isPartOf | N23dd972255bf491fb2965f84d6691ef7 |
15 | ″ | ″ | Nc69ce8829e1c40c788b1383aec828a1f |
16 | ″ | ″ | sg:journal.1046649 |
17 | ″ | schema:keywords | B-tree |
18 | ″ | ″ | algorithm |
19 | ″ | ″ | alternative |
20 | ″ | ″ | analysis |
21 | ″ | ″ | authentication |
22 | ″ | ″ | authentication data structure |
23 | ″ | ″ | bottom level |
24 | ″ | ″ | cloud computing techniques |
25 | ″ | ″ | cloud server |
26 | ″ | ″ | cloud server side |
27 | ″ | ″ | computation |
28 | ″ | ″ | computing |
29 | ″ | ″ | computing techniques |
30 | ″ | ″ | conditions |
31 | ″ | ″ | data |
32 | ″ | ″ | data owner side |
33 | ″ | ″ | data owners |
34 | ″ | ″ | data structure |
35 | ″ | ″ | data update |
36 | ″ | ″ | efficiency |
37 | ″ | ″ | efficient data update |
38 | ″ | ″ | efficient updates |
39 | ″ | ″ | first part |
40 | ″ | ″ | function queries |
41 | ″ | ″ | goal |
42 | ″ | ″ | high efficiency |
43 | ″ | ″ | input |
44 | ″ | ″ | intersection |
45 | ″ | ″ | large-scale data |
46 | ″ | ″ | levels |
47 | ″ | ″ | limited resources |
48 | ″ | ″ | line intersections |
49 | ″ | ″ | maturity |
50 | ″ | ″ | novel scheme |
51 | ″ | ″ | outsourced computing |
52 | ″ | ″ | owner side |
53 | ″ | ″ | owners |
54 | ″ | ″ | paper |
55 | ″ | ″ | part |
56 | ″ | ″ | popularity |
57 | ″ | ″ | queries |
58 | ″ | ″ | query conditions |
59 | ″ | ″ | query requests |
60 | ″ | ″ | query results |
61 | ″ | ″ | requests |
62 | ″ | ″ | resources |
63 | ″ | ″ | results |
64 | ″ | ″ | scheme |
65 | ″ | ″ | second part |
66 | ″ | ″ | security goals |
67 | ″ | ″ | server |
68 | ″ | ″ | server side |
69 | ″ | ″ | side |
70 | ″ | ″ | structure |
71 | ″ | ″ | technique |
72 | ″ | ″ | theoretic analysis |
73 | ″ | ″ | top level |
74 | ″ | ″ | trees |
75 | ″ | ″ | update |
76 | ″ | ″ | user input |
77 | ″ | ″ | users |
78 | ″ | ″ | verification algorithm |
79 | ″ | schema:name | Authentication of outsourced linear function query with efficient updates |
80 | ″ | schema:pagination | 10031-10039 |
81 | ″ | schema:productId | N30de0a538b694337b3a16e4f7c93d439 |
82 | ″ | ″ | N729e95712b4b49c893cd1c0efad5ff05 |
83 | ″ | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1090907082 |
84 | ″ | ″ | https://doi.org/10.1007/s10586-017-1064-4 |
85 | ″ | schema:sdDatePublished | 2022-08-04T17:05 |
86 | ″ | schema:sdLicense | https://scigraph.springernature.com/explorer/license/ |
87 | ″ | schema:sdPublisher | N525908a88f1d43f7b61234e7cff2fce5 |
88 | ″ | schema:url | https://doi.org/10.1007/s10586-017-1064-4 |
89 | ″ | sgo:license | sg:explorer/license/ |
90 | ″ | sgo:sdDataset | articles |
91 | ″ | rdf:type | schema:ScholarlyArticle |
92 | N13373476b29e41c4afe6a4248ca2011b | rdf:first | sg:person.013643771071.62 |
93 | ″ | rdf:rest | Nec1a02dc0409486d965697817f9f03a4 |
94 | N1ef58a20bc7148c98250ad47137107f7 | rdf:first | sg:person.011122715333.10 |
95 | ″ | rdf:rest | N295b0e5485c84bcba72be593f1c049c4 |
96 | N23dd972255bf491fb2965f84d6691ef7 | schema:issueNumber | Suppl 4 |
97 | ″ | rdf:type | schema:PublicationIssue |
98 | N295b0e5485c84bcba72be593f1c049c4 | rdf:first | sg:person.012750632275.10 |
99 | ″ | rdf:rest | rdf:nil |
100 | N30de0a538b694337b3a16e4f7c93d439 | schema:name | doi |
101 | ″ | schema:value | 10.1007/s10586-017-1064-4 |
102 | ″ | rdf:type | schema:PropertyValue |
103 | N525908a88f1d43f7b61234e7cff2fce5 | schema:name | Springer Nature - SN SciGraph project |
104 | ″ | rdf:type | schema:Organization |
105 | N729e95712b4b49c893cd1c0efad5ff05 | schema:name | dimensions_id |
106 | ″ | schema:value | pub.1090907082 |
107 | ″ | rdf:type | schema:PropertyValue |
108 | Nc69ce8829e1c40c788b1383aec828a1f | schema:volumeNumber | 22 |
109 | ″ | rdf:type | schema:PublicationVolume |
110 | Ndc2192f80e054ca3ac7eacc3518389d6 | rdf:first | sg:person.010040202763.53 |
111 | ″ | rdf:rest | N1ef58a20bc7148c98250ad47137107f7 |
112 | Nec1a02dc0409486d965697817f9f03a4 | rdf:first | sg:person.015043074604.81 |
113 | ″ | rdf:rest | Ndc2192f80e054ca3ac7eacc3518389d6 |
114 | anzsrc-for:08 | schema:inDefinedTermSet | anzsrc-for: |
115 | ″ | schema:name | Information and Computing Sciences |
116 | ″ | rdf:type | schema:DefinedTerm |
117 | anzsrc-for:0804 | schema:inDefinedTermSet | anzsrc-for: |
118 | ″ | schema:name | Data Format |
119 | ″ | rdf:type | schema:DefinedTerm |
120 | sg:grant.7179489 | http://pending.schema.org/fundedItem | sg:pub.10.1007/s10586-017-1064-4 |
121 | ″ | rdf:type | schema:MonetaryGrant |
122 | sg:journal.1046649 | schema:issn | 1386-7857 |
123 | ″ | ″ | 1573-7543 |
124 | ″ | schema:name | Cluster Computing |
125 | ″ | schema:publisher | Springer Nature |
126 | ″ | rdf:type | schema:Periodical |
127 | sg:person.010040202763.53 | schema:affiliation | grid-institutes:grid.411351.3 |
128 | ″ | schema:familyName | Han |
129 | ″ | schema:givenName | Hongyan |
130 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010040202763.53 |
131 | ″ | rdf:type | schema:Person |
132 | sg:person.011122715333.10 | schema:affiliation | grid-institutes:grid.443651.1 |
133 | ″ | schema:familyName | Gao |
134 | ″ | schema:givenName | Wei |
135 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011122715333.10 |
136 | ″ | rdf:type | schema:Person |
137 | sg:person.012750632275.10 | schema:affiliation | grid-institutes:grid.411429.b |
138 | ″ | schema:familyName | Hu |
139 | ″ | schema:givenName | |
140 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012750632275.10 |
141 | ″ | rdf:type | schema:Person |
142 | sg:person.013643771071.62 | schema:affiliation | grid-institutes:grid.411863.9 |
143 | ″ | schema:familyName | Sheng |
144 | ″ | schema:givenName | Gang |
145 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013643771071.62 |
146 | ″ | rdf:type | schema:Person |
147 | sg:person.015043074604.81 | schema:affiliation | grid-institutes:grid.411863.9 |
148 | ″ | schema:familyName | Tang |
149 | ″ | schema:givenName | Chunming |
150 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015043074604.81 |
151 | ″ | rdf:type | schema:Person |
152 | sg:pub.10.1007/0-306-47008-x_9 | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1025416644 |
153 | ″ | ″ | https://doi.org/10.1007/0-306-47008-x_9 |
154 | ″ | rdf:type | schema:CreativeWork |
155 | sg:pub.10.1007/978-3-319-45744-4_13 | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1043254882 |
156 | ″ | ″ | https://doi.org/10.1007/978-3-319-45744-4_13 |
157 | ″ | rdf:type | schema:CreativeWork |
158 | sg:pub.10.1007/978-3-319-46298-1_23 | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1052976045 |
159 | ″ | ″ | https://doi.org/10.1007/978-3-319-46298-1_23 |
160 | ″ | rdf:type | schema:CreativeWork |
161 | sg:pub.10.1007/978-3-540-30576-7_15 | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1023468933 |
162 | ″ | ″ | https://doi.org/10.1007/978-3-540-30576-7_15 |
163 | ″ | rdf:type | schema:CreativeWork |
164 | sg:pub.10.1007/s00778-008-0113-2 | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1028302855 |
165 | ″ | ″ | https://doi.org/10.1007/s00778-008-0113-2 |
166 | ″ | rdf:type | schema:CreativeWork |
167 | grid-institutes:grid.411351.3 | schema:alternateName | School of Mathematics Science, Liaocheng University, Liaocheng, China |
168 | ″ | schema:name | School of Mathematics Science, Liaocheng University, Liaocheng, China |
169 | ″ | rdf:type | schema:Organization |
170 | grid-institutes:grid.411429.b | schema:alternateName | School of Mathematics and Computational Science, Hunan University of Science and Technology, Xiangtan, China |
171 | ″ | schema:name | School of Mathematics and Computational Science, Hunan University of Science and Technology, Xiangtan, China |
172 | ″ | rdf:type | schema:Organization |
173 | grid-institutes:grid.411863.9 | schema:alternateName | College of Mathematics and Information Science, Guangzhou University, Guangzhou, China |
174 | ″ | schema:name | College of Mathematics and Information Science, Guangzhou University, Guangzhou, China |
175 | ″ | rdf:type | schema:Organization |
176 | grid-institutes:grid.443651.1 | schema:alternateName | School of Mathematics and Statistics Science, Ludong University, Yantai, China |
177 | ″ | schema:name | School of Mathematics and Statistics Science, Ludong University, Yantai, China |
178 | ″ | rdf:type | schema:Organization |