Separating Authentication from Query Execution in Outsourced Databases

被引:10
|
作者
Papadopoulos, Stavros [1 ]
Papadias, Dimitris [1 ]
Cheng, Weiwei [2 ]
Tan, Kian-Lee
机构
[1] Hong Kong Univ Sci & Technol, Hong Kong, Hong Kong, Peoples R China
[2] Natl Univ Singapore, Singapore, Singapore
关键词
D O I
10.1109/ICDE.2009.187
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In the database outsourcing paradigm a data owner (DO) delegates its DBMS administration to a specialized service provider (SP) that receives and processes queries from clients. The traditional outsourcing model (TOM) requires that the DO and the SP maintain authenticated data structures to enable authentication of query results. In this paper, we present SAE, a novel outsourcing model that separates authentication from query execution. Specifically, the DO does not perform any task except for maintaining its dataset (if there are updates). The SP only stores the DO's dataset and computes the query results using a conventional DBMS. All security-related tasks are outsourced to a separate trusted entity (TE), which maintains limited authentication information about the original dataset. A client contacts the TE when it wishes to establish the correctness of a result returned by the SP. The TE efficiently generates a verification token of negligible size. The client can verify the token with minimal cost. SAE eliminates the participation of the DO and the SP in the authentication process, and outperforms TOM in every aspect, including processing cost for all parties involved, communication overhead, query response time and ease of implementation in practical applications.
引用
收藏
页码:1148 / +
页数:2
相关论文
共 50 条
  • [1] ConcurDB: Concurrent Query Authentication for Outsourced Databases
    Bajaj, Sumeet
    Chakraborti, Anrin
    Sion, Radu
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2021, 33 (04) : 1401 - 1412
  • [2] An Online Query Authentication System for Outsourced Databases
    Zhou, Ying
    Wang, Chen
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 570 - 577
  • [3] Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey
    Zhang, Bo
    Dong, Boxiang
    Wang, Wendy Hui
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2021, 33 (04) : 1601 - 1618
  • [4] Query Access Assurance in Outsourced Databases
    Le, Wangchao
    Li, Feifei
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2012, 5 (02) : 178 - 191
  • [5] Query Authentication of Outsourced Spatial Database
    Hong, Jun
    Wen, Tao
    Guo, Quan
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2020, 17 (04) : 539 - 547
  • [6] A Query Verification Scheme for Dynamic Outsourced Databases
    Wang, Xiaoming
    Yuan, Duobao
    [J]. JOURNAL OF COMPUTERS, 2012, 7 (01) : 156 - 160
  • [7] Immutable Authentication and Integrity Schemes for Outsourced Databases
    Yavuz, Attila Altay
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (01) : 69 - 82
  • [8] Bucket-based authentication for outsourced databases
    Wang, Jieping
    Du, Xiaoyong
    Lu, Jiaheng
    Lu, Wei
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2010, 22 (09): : 1160 - 1180
  • [9] Encrypted Data Group Authentication for Outsourced Databases
    Jang, Miyoung
    Jo, Ara
    Chang, Jae-Woo
    [J]. UBIQUITOUS COMPUTING APPLICATION AND WIRELESS SENSOR, 2015, 331 : 695 - 705
  • [10] Authentication of outsourced linear function query with efficient updates
    Gang Sheng
    Chunming Tang
    Hongyan Han
    Wei Gao
    Xing Hu
    [J]. Cluster Computing, 2019, 22 : 10031 - 10039