2014
DOI: 10.1007/978-3-319-12160-4_23
|View full text |Cite
|
Sign up to set email alerts
|

Database Outsourcing with Hierarchical Authenticated Data Structures

Abstract: Abstract. In an outsourced database scheme, the data owner delegates the data management tasks to a remote service provider. At a later time, the remote service is supposed to answer any query on the database. The essential requirements are ensuring the data integrity and authenticity with efficient mechanisms. Current approaches employ authenticated data structures to store security information, generated by the client and used by the server, to compute proofs that show the answers to the queries are authenti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 22 publications
0
8
0
Order By: Relevance
“…To evaluate our SSE scheme, we implemented a prototype with the two-level efficient HADS construction [36] with Flexlist [41] at both levels of the indices, in C++ using Cashlib library. All experiments were performed on a 2.50 GHz machine with 24 cores (but using a single core), with 16 GB RAM and Ubuntu 12.04 LTS operating system.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…To evaluate our SSE scheme, we implemented a prototype with the two-level efficient HADS construction [36] with Flexlist [41] at both levels of the indices, in C++ using Cashlib library. All experiments were performed on a 2.50 GHz machine with 24 cores (but using a single core), with 16 GB RAM and Ubuntu 12.04 LTS operating system.…”
Section: Discussionmentioning
confidence: 99%
“…A hierarchical ADS (HADS) consists of multiple levels of ADSs, possibly of different types [14,36,37].…”
Section: Introductionmentioning
confidence: 99%
“…There are different types of ADSs: accumulators [8], authenticated skip lists [25], authenticated hash tables [32], Merkle hash trees [30], 2-3 trees [31], and hierarchical combinations [21,22]. The accumulator computes an accumulated value over all data items, and a witness for each item as the membership proof.…”
Section: Brief Contextmentioning
confidence: 99%
“…We first draw a circle taking the point q as center and D (P 2 ) as radius, then we get the range query region as shown in Figure 6, denoted as Sr(q). After that, the nodes are visited from root to leaf that enter the shaded Sr(q), and they are {N 1 …”
Section: Knn Query Authenticationmentioning
confidence: 99%
“…Due to the limitations of resources and technology, spatial data owners are often difficult to deal with a large number of query requests [1]. Therefore, the spatial data owners outsource their spatial database to the third party service providers to provide query services.…”
Section: Introductionmentioning
confidence: 99%