2018
DOI: 10.1109/tkde.2017.2773541
|View full text |Cite
|
Sign up to set email alerts
|

Authenticating Aggregate Queries over Set-Valued Data with Confidentiality

Abstract: With recent advances in data-as-a-service (DaaS) and cloud computing, aggregate query services over set-valued data are becoming widely available for business intelligence that drives decision making. However, as the service provider is often a third-party delegate of the data owner, the integrity of the query results cannot be guaranteed and is thus imperative to be authenticated. Unfortunately, existing query authentication techniques either do not work for set-valued data or they lack data confidentiality. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 40 publications
(12 citation statements)
references
References 36 publications
(49 reference statements)
0
11
0
Order By: Relevance
“…This section analyzes the impact of the proposed FT-DCRNN technique via Cloud Sim simulator. The cloudsim goal is to provide a global and extensible simulation framework that compares the proposed FT-DCRNN technique with the existing PAPA [1] and MVNE [2]. The experiment is conducted to measure and evaluate the FT-DCRNN technique on the factors such as throughput, efficiency, average response time and DC.…”
Section: Simulation and Performance Analysismentioning
confidence: 99%
See 3 more Smart Citations
“…This section analyzes the impact of the proposed FT-DCRNN technique via Cloud Sim simulator. The cloudsim goal is to provide a global and extensible simulation framework that compares the proposed FT-DCRNN technique with the existing PAPA [1] and MVNE [2]. The experiment is conducted to measure and evaluate the FT-DCRNN technique on the factors such as throughput, efficiency, average response time and DC.…”
Section: Simulation and Performance Analysismentioning
confidence: 99%
“…Throughput and efficiency of FT-DCRNN technique is evaluated with PAPA [1] and MVNE [2] using the number of user requests as input in the cloud environment in the comparison experiments. The two imperative factors are considered for evaluating infrastructure services afforded by the cloud environment are Throughput and Efficiency.…”
Section: Impact Of Throughput and Efficiencymentioning
confidence: 99%
See 2 more Smart Citations
“…Chen et al [7] developed a novel top-k query authentication based on the cryptography building blocks. Xu et al [11] considered both authenticity and confidentiality for aggregate queries over set-valued data. Lin et al [8] proposed a new ADS called MR-Sky-tree to facilitate the location-based authenticated skyline queries.…”
Section: Related Workmentioning
confidence: 99%