Skip to main content

Research of Query Verification Algorithm on Body Sensing Data in Cloud Computing Environment

  • Conference paper
  • First Online:
Web Information Systems and Applications (WISA 2019)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11817))

Included in the following conference series:

Abstract

Cloud computing enables users with limited resources to accomplish complex computation. Meanwhile, the massive human physiological data generated by Wireless Body Area Network (WBAN) can be benefited by it through being stored in cloud servers. However, cloud storage of human physiological data is challenged by some issues, while one of them is soundness verification. Although local WBAN user is not powerful enough to compute the result on whole data repository, he may have concern on the correctness of the results from cloud which he pays for. To address this problem, this paper proposes a DMB+ tree data structure, and designs a query and verification algorithm for human physiological data in cloud computing environment based on DMB+ tree. By reducing the number of layers returned from the query tree, the algorithm reduces the height of the tree when verifying, thus improving the efficiency of query validation. The experimental results show that the performances in time and network traffic of DMB+ query verification are superior to Merkle tree and digital signature algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Merkle, R.C.: Protocols for public key cryptosystems. In: IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 122–134 (1980)

    Google Scholar 

  2. Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, New York (1990). https://doi.org/10.1007/0-387-34805-0_21

    Chapter  Google Scholar 

  3. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  4. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  5. Nist, C.: The digital signature standard. Commun. ACM 35(7), 36–40 (1992)

    Article  Google Scholar 

  6. Pang, H., Tan, K.: Authenticating query results in edge computing. In: 20th International Conference on Data Engineering, Boston, MA, USA, pp. 560–571 (2004)

    Google Scholar 

  7. Pang, H.H., Jain, A., Ramamritham, K., et al.: Verifying completeness of relational query results in data publishing. In: ACM SIGMOD International Conference on Management of Data, Baltimore, Maryland, USA, pp. 407–418 (2005)

    Google Scholar 

  8. Cheng, W., Pang, H., Tan, K.-L.: Authenticating multi-dimensional query results in data publishing. In: Damiani, E., Liu, P. (eds.) DBSec 2006. LNCS, vol. 4127, pp. 60–73. Springer, Heidelberg (2006). https://doi.org/10.1007/11805588_5

    Chapter  Google Scholar 

  9. Ateniese, G., Burns, R., Curtmola, R., et al.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14(1), 1–34 (2011)

    Article  Google Scholar 

  10. Lund, C., Fortnow, L., Karloff, H., et al.: Algebraic methods for interactive proof systems. J. ACM 39(4), 859–868 (1992)

    Article  MathSciNet  Google Scholar 

  11. Shamir, A.: IP = PSPACE (interactive proof = polynomial space). In: 31st Annual Symposium on Foundations of Computer Science, St. Louis, Missouri, USA, vol. 1, pp. 11–15 (1990)

    Google Scholar 

  12. Wu, J., Ni, W., Zhang, S.: Generalization based privacy-preserving provenance publishing. In: Meng, X., Li, R., Wang, K., Niu, B., Wang, X., Zhao, G. (eds.) WISA 2018. LNCS, vol. 11242, pp. 287–299. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-02934-0_27

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lan Yao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gao, Y., Yao, L., Yu, J. (2019). Research of Query Verification Algorithm on Body Sensing Data in Cloud Computing Environment. In: Ni, W., Wang, X., Song, W., Li, Y. (eds) Web Information Systems and Applications. WISA 2019. Lecture Notes in Computer Science(), vol 11817. Springer, Cham. https://doi.org/10.1007/978-3-030-30952-7_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30952-7_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30951-0

  • Online ISBN: 978-3-030-30952-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics