Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey

被引:8
|
作者
Zhang, Bo [1 ]
Dong, Boxiang [2 ]
Wang, Wendy Hui [1 ]
机构
[1] Stevens Inst Technol, Dept Comp Sci, Hoboken, NJ 07030 USA
[2] Montclair State Univ, Dept Comp Sci, Montclair, NJ 07043 USA
基金
美国国家科学基金会;
关键词
Authentication; Query processing; Aggregates; Cloud computing; Probabilistic logic; Database-as-a-Service; SQL query; result integrity verification; SIGNATURES;
D O I
10.1109/TKDE.2019.2947061
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Spurred by the development of cloud computing, there has been considerable recent interest in the Database-as-a-Service (DaaS) paradigm. Users lacking in expertise or computational resources can outsource their data and database management needs to a third-party service provider. Outsourcing, however, raises an important issue of result integrity: how can the client verify with lightweight overhead that the query results returned by the service provider are correct (i.e., the same as the results of query execution locally)? This survey focuses on categorizing and reviewing the progress on the current approaches for result integrity of SQL query evaluation in the DaaS model. The survey also includes some potential future research directions for result integrity verification of the outsourced computations.
引用
收藏
页码:1601 / 1618
页数:18
相关论文
共 50 条
  • [31] Towards Efficient Authenticated Subgraph Query Service in Outsourced Graph Databases
    Fan, Zhe
    Peng, Yun
    Choi, Byron
    Xu, Jianliang
    Bhowmick, Sourav S.
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2014, 7 (04) : 696 - 713
  • [32] Efficient Privacy-Preserving Query Processing on Outsourced Geographic Databases
    Zhao, Li
    Liu, Qin
    Huang, Hejiao
    Jia, Xiaohua
    [J]. 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [33] RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases
    Maria Rodriguez-Henriquez, Lil
    Chakraborty, Debrup
    [J]. SECURITY AND TRUST MANAGEMENT, STM 2013, 2013, 8203 : 115 - 130
  • [34] A generalized SQL query construct for paraconsistent intuitionistic fuzzy databases
    Wang, HB
    Sunderraman, R
    Zhang, YQ
    Madiraju, P
    [J]. NAFIPS 2005 - 2005 Annual Meeting of the North American Fuzzy Information Processing Society, 2005, : 682 - 686
  • [35] Efficient SQL Adaptive Query Processing in Cloud Databases Systems
    Costa, Clayton Maciel
    Maia Leite, Cicilia Raquel
    Sousa, Antonio Luis
    [J]. PROCEEDINGS OF THE 2016 IEEE CONFERENCE ON EVOLVING AND ADAPTIVE INTELLIGENT SYSTEMS (EAIS), 2016, : 114 - 121
  • [36] Containerized SQL Query Evaluation in a Cloud
    Zhang, Weining
    Holland, David
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SMART CITY/SOCIALCOM/SUSTAINCOM (SMARTCITY), 2015, : 1010 - 1017
  • [37] Visual query systems for databases: A survey
    Catarci, T
    Costabile, MF
    Levialdi, S
    Batini, C
    [J]. JOURNAL OF VISUAL LANGUAGES AND COMPUTING, 1997, 8 (02): : 215 - 260
  • [38] Data integrity verification scheme with designated verifiers for dynamic outsourced databases
    Wang, Xiaoming
    Lin, Yanchun
    Yao, Guoxiang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2293 - 2301
  • [39] Completeness Integrity Protection for Outsourced Databases Using Semantic Fake Data
    Roisum, Holly
    Urizar, Lois
    Yeh, Jyh-haw
    Salisbury, Kedric
    Magette, Megan
    [J]. 2019 4TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND INFORMATION SYSTEMS (ICCIS 2019), 2019, : 222 - 228
  • [40] SQL, NewSQL, and NOSQL Databases: A Comparative Survey
    Khasawneh, Tariq N.
    AL-Sahlee, Mahmoud H.
    Safia, Ali A.
    [J]. 2020 11TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2020, : 013 - 021