Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering ›› 2010, Vol. 36 ›› Issue (4): 115-117. doi: 10.3969/j.issn.1000-3428.2010.04.041

• Security Technology • Previous Articles     Next Articles

Query Authentication Method Based on Merkle Hash Tree in Outsourced Database

YUAN Duo-bao, WANG Xiao-ming   


  1. (Department of Computer, Jinan University, Guangzhou 510632)
  • Received:1900-01-01 Revised:1900-01-01 Online:2010-02-20 Published:2010-02-20

基于MH树的外包数据库查询验证方法

袁多宝,王晓明   

  1. (暨南大学计算机系,广州 510632)

Abstract: This paper analyzes the structural character of Merkle Hash(MH) tree. Aiming at that MH tree has disadvantages such as large verification objects, redundant verification procedures and relative low security and so on, this paper proposes a new authentication method in outsourced database and optimizes this method by using the partially materialize the signatures of some internal nodes. Analysis result show that the method has the advantages of small additional network load, fast verification, higher security, and being able to locate the tamper with the database at fine grain.

Key words: outsourced database, query authentication, database security, Merkle Hash(MH) Tree

摘要: 分析Merkle Hash(MH)树的结构特征,针对MH树的验证对象大、验证过程存在冗余、安全性低等不足,提出一种新的外包数据查询认证方法,使用部分物化中间节点的签名方法进行优化。分析结果表明,该方法具有网络附加负载小、验证快、安全性较高、能迅速实现篡改定位等优点。

关键词: 外包数据库, 查询验证, 数据库安全, Merkle Hash树

CLC Number: