Secure Distributed Top-k Aggregation

被引:0
|
作者
Jonsson, Kristjan V. [1 ]
Palmskog, Karl [2 ]
Vigfusson, Ymir [1 ]
机构
[1] Reykjavik Univ, Sch Comp Sci, Reykjavik, Iceland
[2] KTH Royal Inst Technol, Sch Comp Sci & Commun, Stockholm, Sweden
关键词
Distributed systems; secure in-network aggregation; top-k aggregation; trusted systems;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In-network aggregation is an efficient and scalable distributed approach to global state approximation. However, security remains an open problem in such systems, especially when we consider dynamic network effects, such as mobility, packet loss and churn. In this paper, we consider the reseilience of the top-k aggregate to manipulation by active insider adversaries. Unfortunately, this versatile aggregation function is inherently insecure. We propose a simple, low-overhead solution to the problem of preserving aggregate integrity which leverages the principles of trusted systems. The solution we propose is generally applicable, even to the challenging problem of securing distributed aggregation in a dynamic network.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Distributed top-k aggregation queries at large
    Thomas Neumann
    Matthias Bender
    Sebastian Michel
    Ralf Schenkel
    Peter Triantafillou
    Gerhard Weikum
    [J]. Distributed and Parallel Databases, 2009, 26 : 3 - 27
  • [2] Distributed top-k aggregation queries at large
    Neumann, Thomas
    Bender, Matthias
    Michel, Sebastian
    Schenkel, Ralf
    Triantafillou, Peter
    Weikum, Gerhard
    [J]. DISTRIBUTED AND PARALLEL DATABASES, 2009, 26 (01) : 3 - 27
  • [3] Top-k vectorial aggregation queries in a distributed environment
    Sagy, Guy
    Sharfman, Izchak
    Keren, Daniel
    Schuster, Assaf
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2011, 71 (02) : 302 - 315
  • [4] Authenticated Top-K Aggregation in Distributed and Outsourced Databases
    Choi, Sunoh
    Lim, Hyo-Sang
    Bertino, Elisa
    [J]. PROCEEDINGS OF 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, RISK AND TRUST AND 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM/PASSAT 2012), 2012, : 779 - 788
  • [5] Secure Data Aggregation for Top-k Queries in Tiered Wireless Sensor Networks
    Liang, Junbin
    Jiang, Chan
    Ma, Xingpo
    Wang, Gaocai
    Kui, Xiaoyan
    [J]. AD HOC & SENSOR WIRELESS NETWORKS, 2016, 32 (1-2) : 51 - 78
  • [6] Approximate distributed top-k queries
    Boaz Patt-Shamir
    Allon Shafrir
    [J]. Distributed Computing, 2008, 21 : 1 - 22
  • [7] Optimizing Distributed Top-k Queries
    Neumann, Thomas
    Bender, Matthias
    Michel, Sebastian
    Schenkel, Ralf
    Triantafillou, Peter
    Weikum, Gerhard
    [J]. WEB INFORMATION SYSTEMS ENGINEERING - WISE 2008, PROCEEDINGS, 2008, 5175 : 337 - +
  • [8] Distributed Top-k Pattern Mining
    Wang, Xin
    Xiang, Mingyue
    Zhan, Huayi
    Lan, Zhuo
    He, Yuang
    He, Yanxiao
    Sha, Yuji
    [J]. WEB AND BIG DATA, APWEB-WAIM 2021, PT II, 2021, 12859 : 203 - 220
  • [9] Secure Top-k Inner Product Retrieval
    Zhang, Zhilin
    Wang, Ke
    Lin, Chen
    Lin, Weipeng
    [J]. CIKM'18: PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2018, : 77 - 86
  • [10] Approximate distributed top-k queries
    Patt-Shamir, Boaz
    Shafrir, Allon
    [J]. DISTRIBUTED COMPUTING, 2008, 21 (01) : 1 - 22