Separating Authentication from Query Execution in Outsourced Databases

被引:10
|
作者
Papadopoulos, Stavros [1 ]
Papadias, Dimitris [1 ]
Cheng, Weiwei [2 ]
Tan, Kian-Lee
机构
[1] Hong Kong Univ Sci & Technol, Hong Kong, Hong Kong, Peoples R China
[2] Natl Univ Singapore, Singapore, Singapore
关键词
D O I
10.1109/ICDE.2009.187
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In the database outsourcing paradigm a data owner (DO) delegates its DBMS administration to a specialized service provider (SP) that receives and processes queries from clients. The traditional outsourcing model (TOM) requires that the DO and the SP maintain authenticated data structures to enable authentication of query results. In this paper, we present SAE, a novel outsourcing model that separates authentication from query execution. Specifically, the DO does not perform any task except for maintaining its dataset (if there are updates). The SP only stores the DO's dataset and computes the query results using a conventional DBMS. All security-related tasks are outsourced to a separate trusted entity (TE), which maintains limited authentication information about the original dataset. A client contacts the TE when it wishes to establish the correctness of a result returned by the SP. The TE efficiently generates a verification token of negligible size. The client can verify the token with minimal cost. SAE eliminates the participation of the DO and the SP in the authentication process, and outperforms TOM in every aspect, including processing cost for all parties involved, communication overhead, query response time and ease of implementation in practical applications.
引用
收藏
页码:1148 / +
页数:2
相关论文
共 50 条
  • [21] Query assurance verification for outsourced multi-dimensional databases
    Cheng, Weiwei
    Tan, Kian-Lee
    [J]. JOURNAL OF COMPUTER SECURITY, 2009, 17 (01) : 101 - 126
  • [22] Speculative Query Execution in Relational Databases with Graph Modelling
    Sasak-Okon, Anna
    [J]. PROCEEDINGS OF THE 2016 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2016, 8 : 1383 - 1387
  • [23] An Index-based Secure Query Processing Scheme for Outsourced Databases
    Akiyama, Kento
    Shinozuka, Chisato
    Watanabe, Chiemi
    Amagasa, Toshiyuki
    Kitagawa, Hiroyuki
    [J]. 19TH INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES (IIWAS2017), 2017, : 215 - 223
  • [24] Provably-secure schemes for basic query support in outsourced databases
    Amanatidis, Georgios
    Boldyreva, Alexandra
    O'Neill, Adam
    [J]. DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 14 - +
  • [25] Towards Efficient Authenticated Subgraph Query Service in Outsourced Graph Databases
    Fan, Zhe
    Peng, Yun
    Choi, Byron
    Xu, Jianliang
    Bhowmick, Sourav S.
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2014, 7 (04) : 696 - 713
  • [26] Efficient Privacy-Preserving Query Processing on Outsourced Geographic Databases
    Zhao, Li
    Liu, Qin
    Huang, Hejiao
    Jia, Xiaohua
    [J]. 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [27] RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases
    Maria Rodriguez-Henriquez, Lil
    Chakraborty, Debrup
    [J]. SECURITY AND TRUST MANAGEMENT, STM 2013, 2013, 8203 : 115 - 130
  • [28] Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases
    Yavuz, Attila A.
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII, 2013, 7964 : 179 - 194
  • [29] Query execution scheduling in parallel object-oriented databases
    Taniar, D
    Leung, CHC
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 1999, 41 (03) : 163 - 178
  • [30] Graph-Based Speculative Query Execution in Relational Databases
    Sasak-Okon, Anna
    Tudruj, Marek
    [J]. 2017 16TH INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED COMPUTING (ISPDC-2017), 2017, : 122 - 131