Integrity for Approximate Joins on Untrusted Computational Servers

被引:0
|
作者
di Vimercati, Sabrina De Capitani [1 ]
Foresti, Sara [1 ]
Jajodia, Sushil [2 ]
Paraboschi, Stefano [3 ]
Samarati, Pierangela [1 ]
机构
[1] Univ Milan, I-26013 Crema, Italy
[2] George Mason Univ, Fairfax, VA 22030 USA
[3] Univ Bergamo, I-24044 Dalmine, Italy
关键词
D O I
10.1007/978-3-319-18467-8_30
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the last few years, many efforts have been devoted to the development of solutions aiming at ensuring the confidentiality and integrity of data and computations in the cloud. In particular, a recent solution for verifying the integrity of equi-join queries is based on the insertion of checks (markers and twins) whose presence provides probabilistic guarantees on the integrity of the computation. In this paper, we propose an approach for verifying the integrity of approximate join queries, which is based on the introduction of a discretized version of the join attribute and on the translation of the approximate join into an equijoin defined over the discrete attribute added to the original relations. The proposed approach guarantees the correctness and completeness of the join result, while causing a limited overhead for the user.
引用
收藏
页码:446 / 459
页数:14
相关论文
共 50 条
  • [31] Data Integrity and Availability Verification Game in Untrusted Cloud Storage
    Djebaili, Brahim
    Kiennert, Christophe
    Leneutre, Jean
    Chen, Lin
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2014, 2014, 8840 : 287 - 306
  • [32] Integrating XML data sources using approximate joins
    Guha, Sudipto
    Jagadish, H. V.
    Koudas, Nick
    Srivastava, Divesh
    Yu, Ting
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 2006, 31 (01): : 161 - 207
  • [33] Approximate Joins for XML Using g-String
    Li, Fei
    Wang, Hongzhi
    Zhang, Cheng
    Hao, Liang
    Li, Jianzhong
    Gao, Hong
    DATABASE AND XML TECHNOLOGIES, 2010, 6309 : 3 - 17
  • [34] An Accurate, Flexible and Private Trajectory-Based Contact Tracing System on Untrusted Servers
    Cao, Ruixuan
    Kato, Fumiyuki
    Cao, Yang
    Yoshikawa, Masatoshi
    INFORMATION INTEGRATION AND WEB INTELLIGENCE, IIWAS 2022, 2022, 13635 : 409 - 414
  • [35] Grouper: A Framework for Developing Mobile Applications using a Secret Sharing Scheme and Untrusted Servers
    Li, Meng
    Shinjo, Yasushi
    PROCEEDINGS OF 2017 VI INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2017), 2017, : 125 - 134
  • [36] Speeding up Exponentiation using an Untrusted Computational Resource
    Marten Van Dijk
    Dwaine Clarke
    Blaise Gassend
    G. Edward Suh
    Srinivas Devadas
    Designs, Codes and Cryptography, 2006, 39 : 253 - 273
  • [37] Speeding up exponentiation using an untrusted computational resource
    van Dijk, M
    Clarke, D
    Gassend, B
    Suh, GE
    Devadas, S
    DESIGNS CODES AND CRYPTOGRAPHY, 2006, 39 (02) : 253 - 273
  • [38] Approximate algorithms for document placement in distributed web servers
    Tse, SSH
    I-SPAN 2004: 7TH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND NETWORKS, PROCEEDINGS, 2004, : 61 - 66
  • [39] Approximate algorithms for document placement in distributed Web servers
    Tse, SSH
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2005, 16 (06) : 489 - 496
  • [40] APPROXIMATE ANALYSIS OF MULTIQUEUE SYSTEMS WITH MULTIPLE CYCLIC SERVERS
    LAVELHA, AC
    DESOUZA, JM
    DOVAL, JBR
    PERFORMANCE EVALUATION, 1994, 20 (04) : 391 - 412