Computational geometry: algorithms and applications
Computational geometry: algorithms and applications
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Models and issues in data stream systems
Proceedings of the twenty-first ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Issues in data stream management
ACM SIGMOD Record
Authentic data publication over the internet
Journal of Computer Security - IFIP 2000
A General Model for Authenticated Data Structures
Algorithmica
Verifying completeness of relational query results in data publishing
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Dynamic authenticated index structures for outsourced databases
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Authentication of outsourced databases using signature aggregation and chaining
DASFAA'06 Proceedings of the 11th international conference on Database Systems for Advanced Applications
Authenticating the query results of text search engines
Proceedings of the VLDB Endowment
Partially materialized digest scheme: an efficient verification method for outsourced databases
The VLDB Journal — The International Journal on Very Large Data Bases
Authenticated indexing for outsourced spatial databases
The VLDB Journal — The International Journal on Very Large Data Bases
Authenticated join processing in outsourced databases
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Small synopses for group-by query verification on outsourced data streams
ACM Transactions on Database Systems (TODS)
Continuous Spatial Authentication
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
ICALP '09 Proceedings of the 36th International Colloquium on Automata, Languages and Programming: Part I
Scalable verification for outsourced dynamic databases
Proceedings of the VLDB Endowment
An audit environment for outsourcing of frequent itemset mining
Proceedings of the VLDB Endowment
A framework to enforce access control over data streams
ACM Transactions on Information and System Security (TISSEC)
Authenticated Index Structures for Aggregation Queries
ACM Transactions on Information and System Security (TISSEC)
DEXA'10 Proceedings of the 21st international conference on Database and expert systems applications: Part I
Theoretical Computer Science
Authentication of moving range queries
Proceedings of the 21st ACM international conference on Information and knowledge management
Lightweight authentication of linear algebraic queries on data streams
Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data
Verifiable and private top-k monitoring
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Hi-index | 0.00 |
We study processing and authentication of long-running queries on outsourced data streams. In this scenario, a data owner (DO) constantly transmits its data to a service provider (SP), together with additional authentication information. Clients register continuous range queries to the SP. Whenever the data change, the SP must update the results of all affected queries and inform the clients accordingly. The clients can verify the correctness of the results using the authentication information provided by the DO. Compared to conventional databases, stream environments pose new challenges such as the need for fast structure updating, support for continuous query processing and authentication, and provision for temporal completeness. Specifically, in addition to the correctness of individual results, the client must be able to verify that there are no missing results in between updates. We face these challenges through several contributions. Since there is no previous work, we first present a technique, called REF, that achieves correctness and temporal completeness but incurs false transmissions, i.e., the SP has to inform clients whenever there is a data update, even if their results are not affected. Then, we propose CADS, which minimizes the processing and transmission overhead through an elaborate indexing scheme and a virtual caching mechanism. Finally, we extend CADS to the case where multiple owners outsource their data to the same SP. The SP integrates all data in a single authentication process, independently of the number of DOs.