Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey

被引:8
|
作者
Zhang, Bo [1 ]
Dong, Boxiang [2 ]
Wang, Wendy Hui [1 ]
机构
[1] Stevens Inst Technol, Dept Comp Sci, Hoboken, NJ 07030 USA
[2] Montclair State Univ, Dept Comp Sci, Montclair, NJ 07043 USA
基金
美国国家科学基金会;
关键词
Authentication; Query processing; Aggregates; Cloud computing; Probabilistic logic; Database-as-a-Service; SQL query; result integrity verification; SIGNATURES;
D O I
10.1109/TKDE.2019.2947061
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Spurred by the development of cloud computing, there has been considerable recent interest in the Database-as-a-Service (DaaS) paradigm. Users lacking in expertise or computational resources can outsource their data and database management needs to a third-party service provider. Outsourcing, however, raises an important issue of result integrity: how can the client verify with lightweight overhead that the query results returned by the service provider are correct (i.e., the same as the results of query execution locally)? This survey focuses on categorizing and reviewing the progress on the current approaches for result integrity of SQL query evaluation in the DaaS model. The survey also includes some potential future research directions for result integrity verification of the outsourced computations.
引用
收藏
页码:1601 / 1618
页数:18
相关论文
共 50 条
  • [1] ConcurDB: Concurrent Query Authentication for Outsourced Databases
    Bajaj, Sumeet
    Chakraborti, Anrin
    Sion, Radu
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2021, 33 (04) : 1401 - 1412
  • [2] An Online Query Authentication System for Outsourced Databases
    Zhou, Ying
    Wang, Chen
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 570 - 577
  • [3] Immutable Authentication and Integrity Schemes for Outsourced Databases
    Yavuz, Attila Altay
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (01) : 69 - 82
  • [4] Separating Authentication from Query Execution in Outsourced Databases
    Papadopoulos, Stavros
    Papadias, Dimitris
    Cheng, Weiwei
    Tan, Kian-Lee
    [J]. ICDE: 2009 IEEE 25TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2009, : 1148 - +
  • [5] A query integrity assurance scheme for accessing outsourced spatial databases
    Wei-Shinn Ku
    Ling Hu
    Cyrus Shahabi
    Haixun Wang
    [J]. GeoInformatica, 2013, 17 : 97 - 124
  • [6] A query integrity assurance scheme for accessing outsourced spatial databases
    Ku, Wei-Shinn
    Hu, Ling
    Shahabi, Cyrus
    Wang, Haixun
    [J]. GEOINFORMATICA, 2013, 17 (01) : 97 - 124
  • [7] Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases
    Yavuz, Attila A.
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII, 2013, 7964 : 179 - 194
  • [8] IntegriDB: Verifiable SQL for Outsourced Databases
    Zhang, Yupeng
    Katz, Jonathan
    Papamanthou, Charalampos
    [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1480 - 1491
  • [9] Query Access Assurance in Outsourced Databases
    Le, Wangchao
    Li, Feifei
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2012, 5 (02) : 178 - 191
  • [10] Query Authentication of Outsourced Spatial Database
    Hong, Jun
    Wen, Tao
    Guo, Quan
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2020, 17 (04) : 539 - 547