期刊文献+

追加型数据库外包中的查询结果验证 被引量:3

Query Results Authentication of Outsourced Append-Only Databases
在线阅读 下载PDF
导出
摘要 数据库外包是将数据库管理工作外包给专业第三方,而数据库外包中需要解决的关键问题之一是查询结果的验证.提出了外包追加型数据库的问题.根据外包追加型数据库的特点,在现有验证数据结构的基础上,提出了一种新型验证数据结构Min-Max Hash Tree,可以有效地解决客户对查询结果进行验证的问题.对于数据所有者端,给出了基本的数据发送算法;对于服务提供商端,分别给出了一次性查询和连续查询的查询算法和查询结果验证算法.最后,对数据所有者端的验证数据结构的存储、数据发送和服务提供商端的连续查询进行了优化处理,大大节省了数据所有者端的存储空间,提高了数据的整体处理效率.实验表明,Min-Max Hash Tree能够有效完成追加型数据库外包的查询结果验证,并且能够高效率处理大规模数据. In the scenario of database outsourcing, database management is outsourced to the professional third-party, and one of the critical problems is integrity authentication of the query results. As far as we are concerned, we are the first to propose the problem of outsourced append-only database. According to the features of outsourced append-only database, a new authentication data structure, Min-Max Hash tree is proposed based on the current authentication data structure. It can be utilized by the clients to solve the problem of authenticating the query results. For the data owner side, a basic data forwarding algorithm is proposed; and for the service provider side, the algorithm of querying rise, fall or oscillation amplitude in price and the algorithm of query results authentication are proposed respectively for one-shot query and continuous query. Finally, optimization measures are proposed for data forwarding, storage of authenticated data structure in the data owner side and continuous query in the service provider side, by which the space of storage is diminished greatly and the whole efficiency of data processing is improved further. Extensive experiments have demonstrated the effectiveness and efficiency of the proposed Min-Max Hash tree. It can be utilized to authenticate the query results and to process the massive data.
出处 《计算机研究与发展》 EI CSCD 北大核心 2012年第10期2077-2085,共9页 Journal of Computer Research and Development
基金 国家自然科学基金项目(61170169 61170168 61100028) 中央高校基本科研业务费专项基金项目(N110404017)
关键词 追加型数据库 连续查询 服务外包 查询验证 验证对象 append-only database continuous query service outsourcing query authentication verification object
  • 相关文献

参考文献15

  • 1Terry D, Goldberg D, Nichols D, et al. Continuous queries over append-only databases [C]//Proe of the 1992 ACM SIGMOD Int Conf on Management of Data (SIGMOD 1992). New York: ACM, 1992:321-330.
  • 2Norman W P, Diaz O. Active database systems [J]. ACM Computing Surveys, 1999, 31(1): 63-103.
  • 3Devanbu P, Gertz M, Martel C, et al. Authentic data publication over the lnternet[J]. Journal of Computer Security, 2003, 11(3): 291-314.
  • 4Merkle R. A certified digital signature [ G]//LNCS 435: Advance in Cryptology (Crypto'89). Berlin: Springer, 1990: 218-238.
  • 5Li Feifei, Hadjieleftheriou M, Kollios G, et al. Dynamic authenticated index structures for outsourced databases [C] // Proc of the 2006 ACM SIGMOD Int Conf on Management of Data (SIGMOD'06). New York~: ACM, 2006; 121-132.
  • 6咸鹤群,冯登国.外包数据库模型中的完整性检测方案[J].计算机研究与发展,2010,47(6):1107-1115. 被引量:23
  • 7Xie Min, Wang Haixun, Yin Jian, et al. Integrity auditing of outsourced data [C]//Proc of the 33rd Int Conf on Very Large Data Bases (VLDB 2007). New York: ACM, 2007:782-793.
  • 8张敏,洪澄,陈驰.一种服务器透明的外包数据库查询验证方法[J].计算机研究与发展,2010,47(1):182-190. 被引量:17
  • 9Pang H H, Jain A, Ramamritham K, et al. Verifying completeness of relational query results in data publishing [C] // Proc of the 2005 ACM SIGMOD Int Conf on Management of Data(SIGMOD'05 ). New York: ACM, 2005~:407-418.
  • 10Li Feifei, Hadjieleftheriou M, Kollios G, et al. Authenticated index structures for aggregation queries [J].ACM Trans on Information and System Security, 2010, 13 (4) : 1-30.

二级参考文献49

  • 1朱勤,于守健,乐嘉锦.数据库水印研究与进展[J].计算机工程与应用,2006,42(29):198-201. 被引量:18
  • 2朱勤,于守健,乐嘉锦,骆轶姝.外包数据库系统安全机制研究[J].计算机科学,2007,34(2):152-156. 被引量:17
  • 3Cheng W, Pang H, Tan K. Authenticating multidimensional query results in data publishing [C] // LNCS4127: Proc of the 20th IFIP 11. 3 Working Conf on Data and Applications Security (DBSEC 2006). Berlin: Springer, 2006:60-73.
  • 4Devanbu P, Gertz M, Martel C, et al. Stubblebine. Authentic third-party data publication [OL]. p2009-06-05]. http://seelab, cs. ucdavis.edu/-devanbu/authdbpub, pdf.
  • 5Merkle R C. A certified digital signature [C] //LNCS435: Proc of the 9th Annual Int Cryptology Conf on Advances in Cryptology (CRYPTO 1989). Berlin: Springer, 1989: 218- 238.
  • 6Li F, Hadjieleftheriou M, et al. Dynamic authenticated index structures for outsourced databases [C]//Proc of the 2006 ACM SIGMOD Int Conf on Management of Data (SIGMOD 2006). New York: ACM, 2006:121-132.
  • 7Li F, Yi K, Hadjieleftheriou M, et al. Proof-infused streams: Enabling authentication of sliding windows queries on streams [C] //Proc of the 33rd Int Conf on Very Large Data Bases ( VLDB 2007 ): Vienna, Austria: VLDB Endowment, 2007: 147-158.
  • 8Yang Y, Papadopoulos S, Papadias D, et al. Spatial outsourcing for location-based services [C] //Proc of the 24th Int Conf on Data Engineering CA: IEEE Computer Society, (ICDE 2008). Los Alamitos, 2008: 1082-1091.
  • 9Mykletun E, Tsudik G. Aggregation queries in the databaseas-a-service model [C]//LNCS4127: Proc of the 20th IFIP 11. 3 Working Conf on Data and Applications Security (DBSEC 2006). Berlin: Springer, 2006:89-103.
  • 10Mykletun E, Narasimha M, Tsudik G. Authentication and integrity in outsourced databases [J]. ACM Trans on Storage, 2006, 2(2) : 107-138.

共引文献34

同被引文献8

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部