Efficient data authentication in an environment of untrusted third-party distributors

被引:9
作者
Atallah, Mikhail J. [1 ]
Cho, YounSun [1 ]
Kundu, Ashish [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
来源
2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3 | 2008年
关键词
D O I
10.1109/ICDE.2008.4497478
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the third-party model for the distribution of data, the trusted data creator or owner provides an untrusted party E) with data and integrity verification (IV) items for that data. When a user U gets a subset of the data at D or is already in possession of that subset, U may request from D the IV items that make it possible for U to verify the integrity of its data: D must then provide U with the (hopefully small) number of needed IVs. Most of the published work in this area uses the Merkle tree or variants thereof. For the problem of 2-dimensional range data, the best published solutions require D to store O(n log n) IV items for a database of n items, and allow a user U to be sent only O(log n) of those IVs for the purpose of verifying the integrity of the data it receives from D (regardless of the size of U's query rectangle). For data that is modeled as a 2-dimensional grid (such as GIS or image data), this paper shows that better bounds are possible: The number of IVs stored at V (and the time it takes to compute them) can be brought down to O(n), and the number of IVs sent to U for verification can be brought down to a constant.
引用
收藏
页码:696 / 704
页数:9
相关论文
共 17 条
[1]  
BENDER MA, 2000, ICA PROBLEM REVISITE, P88
[2]  
BERKMAN O, 1989, HIGHLY PARALLELIZABL, P309
[3]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[4]  
CHAZELLE B, 1983, SIAM COMPUT, V15, P703
[5]  
DEVANBU P, 2003, J COMPUTER SECURITY, V11
[6]  
DEVANBU P, 2001, FLEXIBLE AUTHENTICAT, P136
[7]  
Goodrich M. T., 2000, EFFICIENT AUTHENTICA
[8]  
Goodrich MT, 2003, LECT NOTES COMPUT SC, V2612, P295
[9]   FAST ALGORITHMS FOR FINDING NEAREST COMMON ANCESTORS [J].
HAREL, D ;
TARJAN, RE .
SIAM JOURNAL ON COMPUTING, 1984, 13 (02) :338-355
[10]  
HORNE B, 2001, ESCROW SERVICES INCE