Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
Skip Lists: A Probabilistic Alternative to Balanced Trees
WADS '89 Proceedings of the Workshop on Algorithms and Data Structures
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Undeniable Replies for Database Queries
Proceedings of the Baltic Conference, BalticDB&IS 2002 - Volume 2
Authentic Third-party Data Publication
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Authenticating distributed data using Web services and XML signatures
Proceedings of the 2002 ACM workshop on XML security
Authentic data publication over the internet
Journal of Computer Security - IFIP 2000
Authenticating Query Results in Edge Computing
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
Verifying completeness of relational query results in data publishing
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Dynamic authenticated index structures for outsourced databases
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Authentication and integrity in outsourced databases
ACM Transactions on Storage (TOS)
Integrity auditing of outsourced data
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Providing freshness guarantees for outsourced databases
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Ensuring correctness over untrusted private database
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Spatial Outsourcing for Location-based Services
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Authenticated join processing in outsourced databases
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Scalable delivery of stream query result
Proceedings of the VLDB Endowment
Authenticated relational tables and authenticated skip lists
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Authenticating kNN query results in data publishing
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Super-efficient verification of dynamic outsourced databases
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Implementing a tamper-evident database system
ASIAN'05 Proceedings of the 10th Asian Computing Science conference on Advances in computer science: data management on the web
Authentication of outsourced databases using signature aggregation and chaining
DASFAA'06 Proceedings of the 11th international conference on Database Systems for Advanced Applications
Ensuring Correctness, Completeness, and Freshness for Outsourced Tree-Indexed Data
Information Resources Management Journal
Efficient query integrity for outsourced dynamic databases
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop
Hi-index | 0.00 |
We present a general and effective method to certify completeness of query results on relational tables stored in an untrusted DBMS. Our main contribution is the concept of "Query Race": we split up a general query into several single attribute queries, and exploit concurrency and speed to bind the complexity to the fastest of them. Our method supports selection queries with general composition of conjunctive and disjunctive order-based conditions on different attributes at the same time. To achieve our results, we require neither previous knowledge of queries nor specific support by the DBMS. We validate our approach with experimental results performed on a prototypical implementation.