A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
ACM Computing Surveys (CSUR)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Executing SQL over encrypted data in the database-service-provider model
Proceedings of the 2002 ACM SIGMOD international conference on Management of data
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Authentic Third-party Data Publication
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Authentic data publication over the internet
Journal of Computer Security - IFIP 2000
Providing Database as a Service
ICDE '02 Proceedings of the 18th International Conference on Data Engineering
Efficient Certificate Revocation
Efficient Certificate Revocation
Authenticating Query Results in Edge Computing
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
A General Model for Authenticated Data Structures
Algorithmica
Extending query rewriting techniques for fine-grained access control
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Selective and Authentic Third-Party Distribution of XML Documents
IEEE Transactions on Knowledge and Data Engineering
Verifying completeness of relational query results in data publishing
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Safe data sharing and data dissemination on smart devices
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Query execution assurance for outsourced databases
VLDB '05 Proceedings of the 31st international conference on Very large data bases
DSAC: integrity for outsourced databases with signature aggregation and chaining
Proceedings of the 14th ACM international conference on Information and knowledge management
Controlling access to published data using cryptography
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
Chip-secured data access: reconciling access rights with data encryption
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
A privacy-preserving index for range queries
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
CADS: continuous authentication on data streams
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Proof-infused streams: enabling authentication of sliding window queries on streams
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Answering aggregation queries in a secure system model
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Integrity auditing of outsourced data
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Verifying Completeness of Relational Query Answers from Online Servers
ACM Transactions on Information and System Security (TISSEC)
Providing freshness guarantees for outsourced databases
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Efficient Content Authentication in Peer-to-Peer Networks
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Authenticating the query results of text search engines
Proceedings of the VLDB Endowment
Efficient integrity checking of untrusted network storage
Proceedings of the 4th ACM international workshop on Storage security and survivability
Access Control Friendly Query Verification for Outsourced Data Publishing
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Query assurance verification for outsourced multi-dimensional databases
Journal of Computer Security - Selected papers from the Third and Fourth Secure Data Management (SDM) workshops
Partially materialized digest scheme: an efficient verification method for outsourced databases
The VLDB Journal — The International Journal on Very Large Data Bases
Authenticated indexing for outsourced spatial databases
The VLDB Journal — The International Journal on Very Large Data Bases
Authenticated join processing in outsourced databases
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Secure outsourced aggregation via one-way chains
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Small synopses for group-by query verification on outsourced data streams
ACM Transactions on Database Systems (TODS)
Continuous Spatial Authentication
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Do You Know Where Your Data's Been? --- Tamper-Evident Database Provenance
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
Dynamic provable data possession
Proceedings of the 16th ACM conference on Computer and communications security
Scalable verification for outsourced dynamic databases
Proceedings of the VLDB Endowment
An audit environment for outsourcing of frequent itemset mining
Proceedings of the VLDB Endowment
COP: privacy-preserving multidimensional partition in DAS paradigm
Proceedings of the 2009 EDBT/ICDT Workshops
How to authenticate graphs without leaking
Proceedings of the 13th International Conference on Extending Database Technology
Provably-secure schemes for basic query support in outsourced databases
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Authenticated relational tables and authenticated skip lists
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Continuous authentication on relational streams
The VLDB Journal — The International Journal on Very Large Data Bases
Time and space efficient algorithms for two-party authenticated data structures
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Super-efficient verification of dynamic outsourced databases
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Data & Knowledge Engineering
A collaborative monitoring mechanism for making a multitenant platform accountable
HotCloud'10 Proceedings of the 2nd USENIX conference on Hot topics in cloud computing
Verifying spatial queries using Voronoi neighbors
Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems
Towards a data-centric view of cloud security
CloudDB '10 Proceedings of the second international workshop on Cloud data management
Query racing: fast completeness certification of query results
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Authenticated Index Structures for Aggregation Queries
ACM Transactions on Information and System Security (TISSEC)
Fine-grained cloud DB damage examination based on bloom filters
WAIM'10 Proceedings of the 11th international conference on Web-age information management
Design and analysis of a ranking approach to private location-based services
ACM Transactions on Database Systems (TODS)
Secure authenticated comparisons
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
OAuth+UAO: a distributed identification mechanism for triplestores
ICCCI'11 Proceedings of the Third international conference on Computational collective intelligence: technologies and applications - Volume Part I
Private data indexes for selective access to outsourced data
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Authentication of location-based skyline queries
Proceedings of the 20th ACM international conference on Information and knowledge management
APR-Quad: an update efficient authenticated dictionary for spatial data
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Efficient audit service outsourcing for data integrity in clouds
Journal of Systems and Software
A signature-based approach of correctness assurance in data outsourcing scenarios
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Shortest path computation with no information leakage
Proceedings of the VLDB Endowment
Authenticating location-based services without compromising location privacy
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
Efficient verification of web-content searching through authenticated web crawlers
Proceedings of the VLDB Endowment
Integrity verification of cloud-hosted data analytics computations
Proceedings of the 1st International Workshop on Cloud Intelligence
Efficient query integrity for outsourced dynamic databases
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop
Authentication of moving range queries
Proceedings of the 21st ACM international conference on Information and knowledge management
AUDIO: an integrity auditing framework of outlier-mining-as-a-service systems
ECML PKDD'12 Proceedings of the 2012 European conference on Machine Learning and Knowledge Discovery in Databases - Volume Part II
iBigTable: practical data integrity for bigtable in public cloud
Proceedings of the third ACM conference on Data and application security and privacy
Predictive spatio-temporal queries: a comprehensive survey and future directions
Proceedings of the First ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems
CloudOptimizer: multi-tenancy for I/O-bound OLAP workloads
Proceedings of the 16th International Conference on Extending Database Technology
Lightweight authentication of linear algebraic queries on data streams
Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data
Access control and query verification for untrusted databases
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
CorrectDB: SQL engine with practical query authentication
Proceedings of the VLDB Endowment
Hi-index | 0.00 |
In outsourced database (ODB)systems the database owner publishes its data through a number of remote servers, with the goal of enabling clients at the edge of the network to access and query the data more efficiently. As servers might be untrusted or can be compromised, query authentication becomes an essential component of ODB systems. Existing solutions for this problem concentrate mostly on static scenarios and are based on idealistic properties for certain cryptographic primitives. In this work, first we define a variety of essential and practical cost metrics associated with ODB systems. Then, we analytically evaluate a number of different approaches, in search for a solution that best leverages all metrics. Most importantly, we look at solutions that can handle dynamic scenarios, where owners periodically update the data residing at the servers. Finally, we discuss query freshness, a new dimension in data authentication that has not been explored before. A comprehensive experimental evaluation of the proposed and existing approaches is used to validate the analytical models and verify our claims. Our findings exhibit that the proposed solutions improve performance substantially over existing approaches, both for static and dynamic environments.