Complete Merkle Hash Trees for Large Dynamic Spatial Data

被引:1
|
作者
Adhikari, Naresh [1 ]
Bushra, Naila [1 ]
Ramkumar, Mahalingam [1 ]
机构
[1] Mississippi State Univ, Dept Comp Sci, Mississippi State, MS 39762 USA
关键词
geographic information system; integrity; Merkle Hash Tree; completeness; big data;
D O I
10.1109/CSCI49370.2019.00246
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Ensuring the integrity of big (large) and dynamic geo-spatial data is essential for assuring the correctness of queries pertaining to such data. Some useful tools towards ensuring integrity include strategies to compute a succinct cryptographic hash of well-structured data. An important requirement of such data structures is the property of completeness. We propose efficient data structures that satisfy this essential property for a wide variety of (geo)spatial data. We highlight how such data structures can be used as a foundation for assured execution of services (such as a map and geo-based web-services) that feed on spatial data.
引用
下载
收藏
页码:1318 / 1323
页数:6
相关论文
共 50 条
  • [1] Merkle Hash Grids Instead of Merkle Trees
    Paris, Jehan-Francois
    Schwarz, Thomas
    2020 IEEE 28TH INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (MASCOTS 2020), 2020, : 95 - 102
  • [2] Dynamic Provable Data Possession Based on Ranked Merkle Hash Tree
    Zou, Jing
    Sun, Yunchuan
    Li, Shixian
    2016 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI), 2016, : 4 - 9
  • [3] Dynamic Data Integrity Auditing Based on Hierarchical Merkle Hash Tree in Cloud Storage
    Liu, Zhenpeng
    Wang, Shuo
    Duan, Sichen
    Ren, Lele
    Wei, Jianhang
    ELECTRONICS, 2023, 12 (03)
  • [4] The Cloud Access Control Based on Dynamic Feedback and Merkle Hash Tree
    Yi, Xiushuang
    Wang, Weiqiang
    2012 FIFTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2012), VOL 1, 2012, : 217 - 221
  • [5] Dynamic Merkle Trees for Verifying Privileges in Sensor Networks
    Zhou, Li
    Ravishankar, Chinya V.
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2276 - 2282
  • [6] Optimal parameter selection for efficient memory integrity verification using Merkle hash trees
    Williams, D
    Sirer, EG
    THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, : 383 - 388
  • [7] Dynamic Spatial Approximation Trees for Massive Data
    Navarro, Gonzalo
    Reyes, Nora
    SISAP 2009: 2009 SECOND INTERNATIONAL WORKSHOP ON SIMILARITY SEARCH AND APPLICATIONS, PROCEEDINGS, 2009, : 81 - +
  • [8] SDTP plus : Securing a Distributed Transport Protocol for WSNs using Merkle Trees and Hash Chains
    Dvir, Amit
    Buttyan, Levente
    Ta Vinh Thong
    2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2013,
  • [9] Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method
    Jayaprakash, J. Stanly
    Balasubramanian, Kishore
    Sulaiman, Rossilawati
    Hasan, Mohammad Kamrul
    Parameshachari, B. D.
    Iwendi, Celestine
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 519 - 534
  • [10] Combining Merkle Hash Tree and Chaotic Cryptography for Secure Data Fusion in IoT
    Nesa, Nashreen
    Banerjee, Indrajit
    TRANSACTIONS ON COMPUTATIONAL SCIENCE XXXV: SPECIAL ISSUE ON SIGNAL PROCESSING AND SECURITY IN DISTRIBUTED SYSTEMS, 2020, 11960 : 85 - 105