Authenticated Index Structures for Aggregation Queries

被引:53
作者
Li, Feifei [1 ]
Hadjieleftheriou, Marios [2 ]
Kollios, George [3 ]
Reyzin, Leonid [3 ]
机构
[1] Florida State Univ, Dept Comp Sci, Tallahassee, FL 32306 USA
[2] AT&T Labs Res, Florham Pk, NJ 07932 USA
[3] Boston Univ, Dept Comp Sci, Boston, MA 02215 USA
基金
美国国家科学基金会;
关键词
Algorithms; Performance; Security; Aggregation; authentication; indexing; outsourced databases;
D O I
10.1145/1880022.1880026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Query authentication is an essential component in Outsourced DataBase (ODB) systems. This article introduces efficient index structures for authenticating aggregation queries over large datasets. First, we design an index that features good performance characteristics for static environments. Then, we propose more involved structures for the dynamic case. Our structures feature excellent performance for authenticating queries with multiple aggregate attributes and multiple selection predicates. Furthermore, our techniques cover a large number of aggregate types, including distributive aggregates (such as SUM, COUNT, MIN, and MAX), algebraic aggregates (such as the AVG), and holistic aggregates (such as MEDIAN and QUANTILE). We have also addressed the issue of authenticating aggregation queries efficiently when the database is encrypted to protect data confidentiality. Finally, we implemented a working prototype of the proposed techniques and experimentally validated the effectiveness and efficiency of our methods.
引用
收藏
页数:35
相关论文
共 49 条
[1]  
Agrawal R., 2005, PRIVACY PRESERVING O, P251
[2]  
Agrawal R., 2004, P ACM SIGMOD INT C M, P563
[3]  
Anagnostopoulos A., 2001, INFORM SECURITY, P379, DOI DOI 10.1007/3-540-45439-X
[4]  
[Anonymous], 2009, PVLDB
[5]  
[Anonymous], 2005, P 31 INT C VERY LARG
[6]   Efficient data authentication in an environment of untrusted third-party distributors [J].
Atallah, Mikhail J. ;
Cho, YounSun ;
Kundu, Ashish .
2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, :696-704
[7]   Selective and authentic third-party distribution of XML documents [J].
Bertino, E ;
Carminati, B ;
Ferrari, E ;
Thuraisingham, B ;
Gupta, A .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (10) :1263-1278
[8]  
Cheng WW, 2006, LECT NOTES COMPUT SC, V4127, P60
[9]  
Dai W., Crypto++ library
[10]  
Devanbu PremkumarT., 2000, IFIP Workshop on Database Security, P101