Efficient detection of unauthorized data modification in cloud databases Conference proceeding (June 2014)