2008
DOI: 10.1145/1330332.1330337
|View full text |Cite
|
Sign up to set email alerts
|

Verifying Completeness of Relational Query Answers from Online Servers

Abstract: The number of successful attacks on the Internet shows that it is very difficult to guarantee the security of online servers over extended periods of time. A breached server that is not detected in time may return incorrect query answers to users. In this article, we introduce authentication schemes for users to verify that their query answers from an online server are complete (i.e., no qualifying tuples are omitted) and authentic (i.e., all the result values are legitimate). We introduce a scheme that suppor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 40 publications
(16 citation statements)
references
References 36 publications
0
16
0
Order By: Relevance
“…This technique significantly reduces the verified proof size, but incurs central processing unit (CPU) overhead because of the embedded information. The recent work of Pang and Tan [32] addressed an efficient authentication scheme for multi-attribute range aggregate queries. In this scheme, a multi-dimensional structure that maintains partial aggregates at the internal nodes of the structure is used.…”
Section: Iet Information Securitymentioning
confidence: 99%
“…This technique significantly reduces the verified proof size, but incurs central processing unit (CPU) overhead because of the embedded information. The recent work of Pang and Tan [32] addressed an efficient authentication scheme for multi-attribute range aggregate queries. In this scheme, a multi-dimensional structure that maintains partial aggregates at the internal nodes of the structure is used.…”
Section: Iet Information Securitymentioning
confidence: 99%
“…In some tree based schemes join processing is achieved in rather a straight forward way [26,35,14,29], which leads to significant increase in the size of the query responses and also the stored data in the server side. In [28] a special tree structure called authenticated aggregation B tree was specifically designed to handle aggregation queries, other tree based schemes cannot handle aggregation queries as a part of the scheme.…”
Section: Type Of Queriesmentioning
confidence: 99%
“…This issue is orthogonal to the proposed work because our work is about privacy preservation on an encrypted database, while [21], [22] are about the authentication of data that are in clear plaintext. The manner in which to verify the query result in a database as a service model is dealt with in [13]. It employs the aggregate signature and Merkle hash chain to show the correctness of the result of the range query.…”
Section: Other Related Work On Database Securitymentioning
confidence: 99%