Separating Authentication from Query Execution in Outsourced Databases

被引:10
|
作者
Papadopoulos, Stavros [1 ]
Papadias, Dimitris [1 ]
Cheng, Weiwei [2 ]
Tan, Kian-Lee
机构
[1] Hong Kong Univ Sci & Technol, Hong Kong, Hong Kong, Peoples R China
[2] Natl Univ Singapore, Singapore, Singapore
关键词
D O I
10.1109/ICDE.2009.187
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In the database outsourcing paradigm a data owner (DO) delegates its DBMS administration to a specialized service provider (SP) that receives and processes queries from clients. The traditional outsourcing model (TOM) requires that the DO and the SP maintain authenticated data structures to enable authentication of query results. In this paper, we present SAE, a novel outsourcing model that separates authentication from query execution. Specifically, the DO does not perform any task except for maintaining its dataset (if there are updates). The SP only stores the DO's dataset and computes the query results using a conventional DBMS. All security-related tasks are outsourced to a separate trusted entity (TE), which maintains limited authentication information about the original dataset. A client contacts the TE when it wishes to establish the correctness of a result returned by the SP. The TE efficiently generates a verification token of negligible size. The client can verify the token with minimal cost. SAE eliminates the participation of the DO and the SP in the authentication process, and outperforms TOM in every aspect, including processing cost for all parties involved, communication overhead, query response time and ease of implementation in practical applications.
引用
收藏
页码:1148 / +
页数:2
相关论文
共 50 条
  • [31] Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification
    Wang, Xu An
    Weng, Jian
    Ma, Jianfeng
    Yang, Xiaoyuan
    [J]. INFORMATION SCIENCES, 2019, 488 : 13 - 18
  • [32] Secure Ranked Query Processing in Location Based Services Accessing Outsourced Spatial Databases
    Falke, Priyanka W.
    Mahalle, Vshwanath S.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 531 - 536
  • [33] Query Integrity Assurance of Location-Based Services Accessing Outsourced Spatial Databases
    Ku, Wei-Shinn
    Hu, Ling
    Shahabi, Cyrus
    Wang, Haixun
    [J]. ADVANCES IN SPATIAL AND TEMPORAL DATABASES, PROCEEDINGS, 2009, 5644 : 80 - +
  • [34] A spatial transformation scheme supporting data privacy and query integrity for security of outsourced databases
    Kim, Hyeong-Il
    Hossain, Al-Amin
    Chang, Jae-Woo
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (10) : 1498 - 1509
  • [35] The Impact of Geometrical Objects Generalization on the Query Execution Efficiency in Spatial Databases
    Lupa, Michal
    Piorkowski, Adam
    [J]. BEYOND DATABASES, ARCHITECTURES AND STRUCTURES, BDAS 2014, 2014, 424 : 454 - 464
  • [36] An Algorithm for Solving Natural Language Query Execution Problems on Relational Databases
    Enikuomehin, A. O.
    Okwufulueze, D. O.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (10) : 169 - 175
  • [37] Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases
    Ciriani, Valentina
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Jajodia, Sushi
    Paraboschi, Stefano
    Samarati, Pierangela
    [J]. 2009 29TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, 2009, : 32 - +
  • [38] Query execution strategies for missing data in distributed heterogeneous object databases
    Koh, JL
    Chen, ALP
    [J]. PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, 1996, : 466 - 473
  • [39] Query execution time estimation in graph databases based on graph neural networks
    He, Zhenzhen
    Yu, Jiong
    Gu, Tiquan
    Yang, Dexian
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2024, 36 (04)
  • [40] Tell me the truth: Practically public authentication for outsourced databases with multi-user modification
    Song, Wei
    Wang, Bing
    Wang, Qian
    Peng, Zhiyong
    Lou, Wenjing
    [J]. INFORMATION SCIENCES, 2017, 387 : 221 - 237