Scalable Verification for Outsourced Dynamic Databases

Query answers from servers operated by third parties need to be verified, as the third parties may not be trusted or their servers may be compromised. Most of the existing authentication methods construct validity proofs based on the Merkle hash tree (MHT). The MHT, however, imposes severe concurren...

Full description

Saved in:
Bibliographic Details
Main Authors: PANG, Hwee Hwa, ZHANG, Jilian, MOURATIDIS, Kyriakos
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2009
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/876
https://ink.library.smu.edu.sg/context/sis_research/article/1875/viewcontent/VLDB09_Authentication.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-1875
record_format dspace
spelling sg-smu-ink.sis_research-18752016-04-29T10:00:23Z Scalable Verification for Outsourced Dynamic Databases PANG, Hwee Hwa ZHANG, Jilian MOURATIDIS, Kyriakos Query answers from servers operated by third parties need to be verified, as the third parties may not be trusted or their servers may be compromised. Most of the existing authentication methods construct validity proofs based on the Merkle hash tree (MHT). The MHT, however, imposes severe concurrency constraints that slow down data updates. We introduce a protocol, built upon signature aggregation, for checking the authenticity, completeness and freshness of query answers. The protocol offers the important property of allowing new data to be disseminated immediately, while ensuring that outdated values beyond a pre-set age can be detected. We also propose an efficient verification technique for ad-hoc equijoins, for which no practical solution existed. In addition, for servers that need to process heavy query workloads, we introduce a mechanism that significantly reduces the proof construction time by caching just a small number of strategically chosen aggregate signatures. The efficiency and efficacy of our proposed mechanisms are confirmed through extensive experiments. 2009-08-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/876 info:doi/10.14778/1687627.1687718 https://ink.library.smu.edu.sg/context/sis_research/article/1875/viewcontent/VLDB09_Authentication.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Aggregate signature Authentication methods Concurrency constraints Construct validity Construction time Data update Dynamic database Merkle hash tree Practical solutions Third parties Verification techniques Databases and Information Systems Numerical Analysis and Scientific Computing
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Aggregate signature
Authentication methods
Concurrency constraints
Construct validity
Construction time
Data update
Dynamic database
Merkle hash tree
Practical solutions
Third parties
Verification techniques
Databases and Information Systems
Numerical Analysis and Scientific Computing
spellingShingle Aggregate signature
Authentication methods
Concurrency constraints
Construct validity
Construction time
Data update
Dynamic database
Merkle hash tree
Practical solutions
Third parties
Verification techniques
Databases and Information Systems
Numerical Analysis and Scientific Computing
PANG, Hwee Hwa
ZHANG, Jilian
MOURATIDIS, Kyriakos
Scalable Verification for Outsourced Dynamic Databases
description Query answers from servers operated by third parties need to be verified, as the third parties may not be trusted or their servers may be compromised. Most of the existing authentication methods construct validity proofs based on the Merkle hash tree (MHT). The MHT, however, imposes severe concurrency constraints that slow down data updates. We introduce a protocol, built upon signature aggregation, for checking the authenticity, completeness and freshness of query answers. The protocol offers the important property of allowing new data to be disseminated immediately, while ensuring that outdated values beyond a pre-set age can be detected. We also propose an efficient verification technique for ad-hoc equijoins, for which no practical solution existed. In addition, for servers that need to process heavy query workloads, we introduce a mechanism that significantly reduces the proof construction time by caching just a small number of strategically chosen aggregate signatures. The efficiency and efficacy of our proposed mechanisms are confirmed through extensive experiments.
format text
author PANG, Hwee Hwa
ZHANG, Jilian
MOURATIDIS, Kyriakos
author_facet PANG, Hwee Hwa
ZHANG, Jilian
MOURATIDIS, Kyriakos
author_sort PANG, Hwee Hwa
title Scalable Verification for Outsourced Dynamic Databases
title_short Scalable Verification for Outsourced Dynamic Databases
title_full Scalable Verification for Outsourced Dynamic Databases
title_fullStr Scalable Verification for Outsourced Dynamic Databases
title_full_unstemmed Scalable Verification for Outsourced Dynamic Databases
title_sort scalable verification for outsourced dynamic databases
publisher Institutional Knowledge at Singapore Management University
publishDate 2009
url https://ink.library.smu.edu.sg/sis_research/876
https://ink.library.smu.edu.sg/context/sis_research/article/1875/viewcontent/VLDB09_Authentication.pdf
_version_ 1770570746921222144