Proceedings of the 17th ACM Conference on Information and Knowledge Management 2008
DOI: 10.1145/1458082.1458196
|View full text |Cite
|
Sign up to set email alerts
|

Dual encryption for query integrity assurance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
38
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 54 publications
(38 citation statements)
references
References 18 publications
0
38
0
Order By: Relevance
“…These techniques provide deterministic integrity guarantees but only for queries with conditions on the attribute(s) on which the data structure has been built. Probabilistic approaches complement the data with fictitious information or checks whose absence in a query result signals an integrity violation (e.g., [21,47,50]). Probabilistic approaches can detect an integrity violation for any query but with only probabilistic guarantees.…”
Section: Integrity Of Computationsmentioning
confidence: 99%
“…These techniques provide deterministic integrity guarantees but only for queries with conditions on the attribute(s) on which the data structure has been built. Probabilistic approaches complement the data with fictitious information or checks whose absence in a query result signals an integrity violation (e.g., [21,47,50]). Probabilistic approaches can detect an integrity violation for any query but with only probabilistic guarantees.…”
Section: Integrity Of Computationsmentioning
confidence: 99%
“…Authenticated data structures provide deterministic guarantees but they are defined over a specific attribute and only queries operating on it can be verified. Probabilistic approaches can be adopted with any query, but provide probabilistic guarantees only (e.g., [3,17,18]). The approach in [18] inserts into the original relation a set of fake tuples, generated according to a deterministic function, before outsourcing the relation.…”
Section: Related Workmentioning
confidence: 99%
“…Absence of the expected fake tuples in a query result signals its incompleteness. The solution in [17] duplicates a subset of the tuples in the original relation and encrypts them with a different key. Since the external server cannot recognize duplicated tuples, their absence from the query result signals a misbehavior.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Assessing integrity for query results or computations entails providing users with the ability to verify that the result returned by the cloud provider is complete (i.e., computed on the whole data collection), correct (i.e., computed on genuine data and correctly performing the computation), and fresh (i.e., computed on the most recent version of the data). Approaches for guaranteeing integrity of query results can be classified as deterministic (e.g., [30,31,32]) and probabilistic (e.g., [15,23,36,38,40,42]). Deterministic solutions use authenticated data structures (e.g., signature chains, Merkle hash trees, skip lists) or encryption-based solutions and can detect an integrity violation only for queries formulated on the attribute(s) on which they have been defined.…”
mentioning
confidence: 99%