Á¤º¸°úÇÐȸ ³í¹®Áö D : µ¥ÀÌŸº£À̽º
ÇѱÛÁ¦¸ñ(Korean Title) |
°ø°£ µ¥ÀÌÅͺ£À̽º ¾Æ¿ô¼Ò½ÌÀ» À§ÇÑ ºñÆ®¸Ê ¾ÏÈ£È ±â¹Ý ÁúÀÇ °á°ú ¹«°á¼º °ËÁõ±â¹ý |
¿µ¹®Á¦¸ñ(English Title) |
A Query Result Integrity Auditing Method based on Bitmap Encryption for Spatial Database Outsourcing |
ÀúÀÚ(Author) |
Àå¹Ì¿µ
À±µé³á
ÀåÀç¿ì
Mi Young Jang
Deulnyeok Youn
Jae Woo Chang
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 41 NO. 01 PP. 0028 ~ 0036 (2014. 02) |
Çѱ۳»¿ë (Korean Abstract) |
Ãֱ٠Ŭ¶ó¿ìµå ÄÄÇ»ÆÃÀÌ ¹ßÀüÇÔ¿¡ µû¶ó, À̸¦ È°¿ëÇÑ µ¥ÀÌÅͺ£À̽º ¾Æ¿ô¼Ò½Ì(Outsourcing)¿¡ ´ëÇÑ ¿¬±¸°¡ È°¹ßÈ÷ ÁøÇàµÇ°í ÀÖ´Ù. ±×·¯³ª ±âÁ¸ µ¥ÀÌÅÍ ¾ÏÈ£È ±â¹ýÀº µ¥ÀÌÅÍ ºÐÆ÷¸¦ °í·ÁÇÏÁö ¸øÇØ ¿øº» µ¥ÀÌÅÍ°¡ À¯Ãß °¡´ÉÇÑ ¹®Á¦Á¡À» Áö´Ï¸ç, ÁúÀÇ °á°ú ¹«°á¼º °ËÁõ ±â¹ýÀº ÁúÀÇ °á°ú¿¡ Æ÷ÇԵǴ °ËÁõ µ¥ÀÌÅÍÀÇ Å©±â°¡ Áõ°¡ÇÏ´Â ¿À¹öÇìµå¸¦ Áö´Ñ´Ù. µû¶ó¼ º» ³í¹®¿¡¼´Â ¾Æ¿ô¼Ò½Ì µÈ µ¥ÀÌÅÍ º¸È£¸¦ À§ÇÑ ºñÆ®¸Ê ¾ÏÈ£È À妽º ±â¹Ý ÁúÀÇ °á°ú ¹«°á¼º °ËÁõ ±â¹ýÀ» Á¦¾ÈÇÑ´Ù. Á¦¾ÈÇÏ´Â ±â¹ýÀº °ø°ÝÀÚÀÇ ¿øº» µ¥ÀÌÅÍ À¯Ãß ¹æÁö¸¦ À§ÇØ µ¥ÀÌÅÍ ºÐÆ÷¸¦ ±â¹ÝÀ¸·Î ¾ÞÄ¿ ¿µ¿ªÀ» ¼±Á¤ÇÑ´Ù. ¾Æ¿ï·¯, ¾ÞÄ¿ ¿µ¿ª º° ½Ã±×´Ïó À妽º¸¦ »ý¼ºÇÏ°í, ÁúÀÇ °á°ú ½Ã±×´Ïó¿Í ºñ±³ÇÔÀ¸·Î½á ÁúÀÇ °á°ú ¹«°á¼ºÀ» Á¦°øÇÑ´Ù. ¼º´É Æò°¡¸¦ ÅëÇØ, Á¦¾ÈÇÏ´Â ±â¹ýÀÌ ±âÁ¸ ±â¹ý¿¡ ºñÇØ °ø°ÝÀÚ·ÎÀÇ ¿øº» µ¥ÀÌÅͺ£À̽º ³ëÃâ È®·üÀ» °¨¼Ò½ÃÅ°¸é¼, ºü¸¥ ÁúÀÇ Ã³¸®¸¦ ¼öÇàÇÔ°ú µ¿½Ã¿¡ ¹«°á¼º °ËÁõÀ» À§ÇÑ °ËÁõ ¿À¹öÇìµå¸¦ °¨¼Ò½ÃÅ°´Â °ÍÀ» °ËÁõÇÑ´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
Due to the advancement in cloud computing technology, research on the outsourced databases has been spotlighted. Consequently, it is becoming more important to guarantee the correctness and completeness for query results. Existing query processing schemes for outsourced databases suffer from an original data leakage problem because they do not consider data distribution when encrypting original data. On the other hand, previous researches on query result integrity suffer from the overhead of verification object transmission. To resolve these problems, we propose a bitmap based data encryption index and a query result integrity auditing method. We propose an anchor selection algorithm using split and merge policies based on data distribution to preserve the privacy of users. Our query result integrity auditing method generates a signature index for each anchor and performs integrity checks by comparing the signature with query results. Through performance evaluation, we show that our method outperforms the existing method in terms of query processing time and verification overhead.
|
Å°¿öµå(Keyword) |
µ¥ÀÌÅͺ£À̽º ¾Æ¿ô¼Ò½Ì
µ¥ÀÌÅͺ£À̽º ¾ÏÈ£È ±â¹ý
ÁúÀÇ °á°ú ¹«°á¼º °ËÁõ ±â¹ý
Èú¹öÆ® Ä¿ºê ±â¹Ý ¾ÏÈ£È
database outsourcing
database encryption scheme
query result integrity auditing method
hilbert-curve based encryption
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|