Authenticated Index Structures for Aggregation Queries

作者: Feifei Li , Marios Hadjieleftheriou , George Kollios , Leonid Reyzin

DOI: 10.1145/1880022.1880026

关键词:

摘要: Query authentication is an essential component in Outsourced DataBase (ODB) systems. This article introduces efficient index structures for authenticating aggregation queries over large datasets. First, we design that features good performance characteristics static environments. Then, propose more involved the dynamic case. Our feature excellent with multiple aggregate attributes and selection predicates. Furthermore, our techniques cover a number of types, including distributive aggregates (such as SUM, COUNT, MIN, MAX), algebraic AVG), holistic MEDIAN QUANTILE). We have also addressed issue efficiently when database encrypted to protect data confidentiality. Finally, implemented working prototype proposed experimentally validated effectiveness efficiency methods.

参考文章(48)
Dan Suciu, Gerome Miklau, Confidentiality and integrity in distributed data exchange University of Washington. ,(2005)
Roberto Tamassia, Nikos Triandopoulos, Efficient Content Authentication in Peer-to-Peer Networks Applied Cryptography and Network Security. pp. 354- 372 ,(2007) , 10.1007/978-3-540-72738-5_23
Premkumar Devanbu, Michael Gertz, Charles Martel, Stuart G. Stubblebine, Authentic Third-party Data Publication Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions. pp. 101- 112 ,(2000) , 10.1007/0-306-47008-X_9
Gerome Miklau, Dan Suciu, Modeling Integrity in Data Exchange Lecture Notes in Computer Science. ,vol. 3178, pp. 41- 54 ,(2004) , 10.1007/978-3-540-30073-1_4
Aris Anagnostopoulos, Michael T. Goodrich, Roberto Tamassia, Persistent Authenticated Dictionaries and Their Applications international conference on information security. pp. 379- 393 ,(2001) , 10.1007/3-540-45439-X_26
Roberto Tamassia, Nikos Triandopoulos, Computational bounds on hierarchical data processing with applications to information security international colloquium on automata languages and programming. pp. 153- 165 ,(2005) , 10.1007/11523468_13
Gene Tsudik, Maithili Narasimha, Einar Mykletun, Authentication and Integrity in Outsourced Databases network and distributed system security symposium. ,(2004)
Radu Sion, Query execution assurance for outsourced databases very large data bases. pp. 601- 612 ,(2005)
Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos, Robert Cohen, Authenticated Data Structures for Graph and Geometric Searching Topics in Cryptology — CT-RSA 2003. pp. 295- 313 ,(2003) , 10.1007/3-540-36563-X_20
Xiaofeng Meng, Min Xie, Haixun Wang, Jian Yin, Integrity auditing of outsourced data very large data bases. pp. 782- 793 ,(2007)