Query assurance verification for dynamic outsourced XML databases

被引:0
|
作者
Nguyen, Viet Hung [1 ]
Dang, Tran Khanh [1 ]
Son, Nguyen Thanh [1 ]
Kueng, Josef [2 ]
机构
[1] Univ Technol, Fac Comp Sci & Engn, Ho Chi Minh City, Vietnam
[2] Johannes Kepler Univ Linz, FAW Inst, Linz, Austria
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With rapid developments of network technologies, database outsourcing is emerging as an important new trend beside the "application-as-a-service". In this model, data owners ship their data to external service providers. Service providers do data management tasks and offer their clients a mechanism to manipulate out-sourced databases. Since a service provider is not always fully trusted, security and privacy of outsourced data are significant issues. These problems are referred to as data confidentiality, user privacy, data privacy and query assurance. Among them, query assurance takes a crucial role to the success of the database outsourcing model. To the best of our knowledge, however, query assurance, especially for outsourced XML databases, has not been concerned reasonably in any previous work. In this paper, we propose a novel index structure, Nested Merkle B+-Tree, combining the advantages of B+-tree and Merkle Hash Tree to completely deal with three issues of query assurance known as correctness, completeness and freshness in dynamic outsourced XML databases. Experimental results with real data-sets prove the effeciency of our proposed solution.
引用
收藏
页码:689 / +
页数:2
相关论文
共 50 条
  • [41] RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases
    Maria Rodriguez-Henriquez, Lil
    Chakraborty, Debrup
    [J]. SECURITY AND TRUST MANAGEMENT, STM 2013, 2013, 8203 : 115 - 130
  • [42] Access Control and Query Verification for Untrusted Databases
    Jain, Rohit
    Prabhakar, Sunil
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII, 2013, 7964 : 211 - 225
  • [43] Small Synopses for Group-By Query Verification on Outsourced Data Streams
    Yi, Ke
    Li, Feifei
    Cormode, Graham
    Hadjieleftheriou, Marios
    Kollios, George
    Srivastava, Divesh
    [J]. ACM TRANSACTIONS ON DATABASE SYSTEMS, 2009, 34 (03):
  • [44] Integrity Assurance Method of Multi-Keyword Query for Encrypted Outsourced Data
    Wang, Ling
    Ji, Shan
    Wang, Zhaokang
    Wang, Xiaowan
    Mohiuddin, Ghulam
    Ren, Yongjun
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (01): : 221 - 234
  • [45] Query-Preserving Watermarking of Relational Databases and XML Documents
    Gross-Amblard, David
    [J]. ACM TRANSACTIONS ON DATABASE SYSTEMS, 2011, 36 (01):
  • [46] Data storage practices and query processing in XML databases: A survey
    Haw, Su-Cheng
    Lee, Chien-Sing
    [J]. KNOWLEDGE-BASED SYSTEMS, 2011, 24 (08) : 1317 - 1340
  • [47] A query algebra for XML P2P databases
    Sartiani, Carlo
    [J]. CURRENT TRENDS IN DATABASE TECHNOLOGY - EDBT 2006, 2006, 4254 : 637 - 648
  • [48] Identification of query result subdocuments and reverse indices in XML databases
    Yoshikawa, M
    Kinutani, H
    Yamamoto, Y
    Kato, H
    Uemura, S
    [J]. ADVANCES IN MULTIMEDIA AND DATABASES FOR THE NEW CENTURY: A SWISS/JAPANESE PERSPECTIVE, 2000, 10 : 188 - 196
  • [49] Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases
    Thompson, Brian
    Haber, Stuart
    Horne, William G.
    Sander, Tomas
    Yao, Danfeng
    [J]. PRIVACY ENHANCING TECHNOLOGIES, PROCEEDINGS, 2009, 5672 : 185 - +
  • [50] DYNAMIC QUERY INTERPRETATION IN RELATIONAL DATABASES
    DATRI, A
    DIFELICE, P
    MOSCARINI, M
    [J]. INFORMATION SYSTEMS, 1989, 14 (03) : 195 - 204