用户名: 密码: 验证码:
图数据库中数据完整性验证策略研究
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Research on Data Integrity Verification Strategy in Graph Database
  • 作者:吴晓风
  • 英文作者:WU Xiao-feng;Department of Information, Shanxi International Business Vocational College;
  • 关键词:图数据库 ; 完整性验证 ; 散列值
  • 英文关键词:graph database;;integrity verification;;hash value
  • 中文刊名:GXJB
  • 英文刊名:Journal of Lanzhou University of Arts and Science(Natural Science Edition)
  • 机构:山西国际商务职业学院信息系;
  • 出版日期:2019-03-10
  • 出版单位:兰州文理学院学报(自然科学版)
  • 年:2019
  • 期:v.33;No.129
  • 语种:中文;
  • 页:GXJB201902016
  • 页数:5
  • CN:02
  • ISSN:62-1212/N
  • 分类号:82-86
摘要
提出了一种有效的完整性验证方案,即可修订的图散列消息验证策略,能用于各种三方数据共享模型,例如基于云计算的图形数据库服务.该策略由随机数生成、标签生成、修订、确定性验证四个算法组成.对该策略进行了算法复杂度分析和安全性分析.对比实验的结果显示,与基于数字签名的方案相比,提出的可修订的图散列消息验证策略是高效的.
        This paper proposes an effective integrity verification scheme, i. e. revised hash message verification strategy, which can be used in various tripartite data sharing models, such as cloud-based graphics database services. The strategy consists of four algorithms: random number generation, label generation, revision and deterministic verification, and has linear complexity. The experimental results show that the proposed revised hash message verification strategy is more efficient than the digital signature-based scheme.
引文
[1] FABREGAT A, KORNINGER F, VITERI G, et al. Reactome graph database: efficient access to complex pathway data[J]. PLoS computational biology,2018,14(1):965-968.
    [2] LABOUSEUR A G, BIRNBAUM J, OLSEN P W, et al. The G* graph database: efficiently managing large distributed dynamic graphs[J]. Distributed and Parallel Databases,2015,33(4):479-514.
    [3] LIU S, LIN G, CHAI B, et al. The future of graph database applications: An electric utility perspective[C]//Technology, Networking, Electronic and Automation Control Conference (ITNEC), 2017 IEEE 2nd Information. IEEE,2017:223-227.
    [4] RITTINGHOUSE J W, RANSOME J F. Cloud computing: implementation, management, and security[M]. Boca Raton: CRC press,2016.
    [5] HASHEM I A T, YAQOOB I, ANUAR N B, et al. The rise of “big data” on cloud computing: Review and open research issues[J]. Information systems,2015,47:98-115.
    [6] MARINESCU D C. Cloud computing: theory and practice[M]. San Francisco: Morgan Kaufmann,2017.
    [7] ALMORSY M, GRUNDY J, MüLLER I. An analysis of the cloud computing security problem[J]. arxiv preprint:2016,9:134-143.
    [8] ALI M, KHAN S U, VASILAKOS A V. Security in cloud computing: opportunities and challenges[J]. Information sciences,2015,305:357-383.
    [9] SEN J. Security and privacy issues in cloud computing[C]//Cloud Technology: Concepts, Methodologies, Tools, and Applications. IGI Global,2015:1585-1630.
    [10] FAN Z , PENG Y , CHOI B , et al. Towards efficient authenticated subgraph query service in outsourced graph databases[J]. IEEE Transactions on Services Computing,2014,7(4):696-713.
    [11] WANG J, CHEN X , HUANG X , et al. Verifiable auditing for outsourced database in cloud computing[J]. IEEE Transactions on Computers,2015,64(11):3293-3303.
    [12] BERTINO E. Protecting information systems from insider threats-concepts and issues[C]//Information Reuse and Integration (IRI), 2011 IEEE International Conference on. IEEE,2011:1-6.
    [13] FELDMAN A J, BLANKSTEIN A, FREEDMAN M J, et al. Privacy and integrity are possible in the untrusted cloud[J]. IEEE Data Eng. Bull.,2012,35(4):73-82.
    [14] LINDELL Y, KATZ J. Introduction to modern cryptography[M]. Boca Raton, FL, USA: CRC Press,2014.
    [15] KUNDU A, ATALLAH M J, BERTINO E. Leakage-free redactable signatures[C]//Proceedings of the second ACM conference on Data and Application Security and Privacy. Altanta,ACM,2012:307-316.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700