Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey

被引:8
|
作者
Zhang, Bo [1 ]
Dong, Boxiang [2 ]
Wang, Wendy Hui [1 ]
机构
[1] Stevens Inst Technol, Dept Comp Sci, Hoboken, NJ 07030 USA
[2] Montclair State Univ, Dept Comp Sci, Montclair, NJ 07043 USA
基金
美国国家科学基金会;
关键词
Authentication; Query processing; Aggregates; Cloud computing; Probabilistic logic; Database-as-a-Service; SQL query; result integrity verification; SIGNATURES;
D O I
10.1109/TKDE.2019.2947061
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Spurred by the development of cloud computing, there has been considerable recent interest in the Database-as-a-Service (DaaS) paradigm. Users lacking in expertise or computational resources can outsource their data and database management needs to a third-party service provider. Outsourcing, however, raises an important issue of result integrity: how can the client verify with lightweight overhead that the query results returned by the service provider are correct (i.e., the same as the results of query execution locally)? This survey focuses on categorizing and reviewing the progress on the current approaches for result integrity of SQL query evaluation in the DaaS model. The survey also includes some potential future research directions for result integrity verification of the outsourced computations.
引用
收藏
页码:1601 / 1618
页数:18
相关论文
共 50 条
  • [21] CorrectDB: SQL Engine with Practical Query Authentication
    Bajaj, Sumeet
    Sion, Radu
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2013, 6 (07): : 529 - 540
  • [22] Efficient authentication of approximate record matching for outsourced databases
    Dong, Boxiang
    Wang, Hui Wendy
    [J]. Advances in Intelligent Systems and Computing, 2019, 838 : 119 - 168
  • [23] Authentication of Outsourced Databases using signature aggregation and chaining
    Narasimha, Maithili
    Tsudik, Gene
    [J]. DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, PROCEEDINGS, 2006, 3882 : 420 - 436
  • [24] Integrity Assurance for Outsourced Databases without DBMS Modification
    Wei, Wei
    Yu, Ting
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 1 - 16
  • [25] Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud
    Yuan, Jiawei
    Yu, Shucheng
    [J]. 2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 520 - 524
  • [26] Query assurance verification for outsourced multi-dimensional databases
    Cheng, Weiwei
    Tan, Kian-Lee
    [J]. JOURNAL OF COMPUTER SECURITY, 2009, 17 (01) : 101 - 126
  • [27] A privacy-preserving aggregate query scheme on outsourced databases
    Jiang, Ya-Jun
    Yang, Bo
    Zhang, Ming-Wu
    Chen, Xu-Ri
    [J]. Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2011, 42 (03): : 721 - 725
  • [28] vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases
    Zhang, Yupeng
    Genkin, Daniel
    Katz, Jonathan
    Papadopoulos, Dimitrios
    Papamanthou, Charalampos
    [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 863 - 880
  • [29] An Index-based Secure Query Processing Scheme for Outsourced Databases
    Akiyama, Kento
    Shinozuka, Chisato
    Watanabe, Chiemi
    Amagasa, Toshiyuki
    Kitagawa, Hiroyuki
    [J]. 19TH INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES (IIWAS2017), 2017, : 215 - 223
  • [30] Provably-secure schemes for basic query support in outsourced databases
    Amanatidis, Georgios
    Boldyreva, Alexandra
    O'Neill, Adam
    [J]. DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 14 - +