Despite the fact that using the services of outsourced data stream servers has extremely been welcomed ,but still the problem of obtaining certainty about received results from these servers is one of the basic challenges in enterprises . For outsourcing these services, the user should be assured by a mechanism about the security of communication channels as well as the correct and honest function of the server, because the server may attack the integrity of the results due to economic and malicious reasons. In such attacks, some parts of results are not sent to the user or sent after being modified or delayed. In this article, we have come up with an efficient method for detecting integrity attacks in outsourced data steam systems based on auditing the results of cross computation. In this method, the main data stream has been enciphered by a key and a small part of data has been enciphered by a different key, as a dependant data stream, and sent to the server. The requested query is applied on both streams and the user judges the integrity of results by comparing the results. Our method imposes a little overhead on the user and needs no change in the structure of the server. The Probabilistic modeling of the method shows that this method has a high efficiency and the results of the exprimental analysis confirm this very well.
Ghayoori, M., Haghjoo, M. (2011). 'Completeness auditing of continuous query results', Journal of Advanced Defense Science & Technology, 2(3), pp. 213-230.
VANCOUVER
Ghayoori, M., Haghjoo, M. Completeness auditing of continuous query results. Journal of Advanced Defense Science & Technology, 2011; 2(3): 213-230.