Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1559845.1559849acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
research-article

Authenticated join processing in outsourced databases

Published: 29 June 2009 Publication History

Abstract

Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner's signature. Previous authentication techniques deal with range queries on a single relation using an authenticated data structure (ADS). On the other hand, authenticated join processing is inherently more complex than ranges since only the base relations (but not their combination) are signed by the owner. In this paper, we present three novel join algorithms depending on the ADS availability: (i) Authenticated Indexed Sort Merge Join (AISM), which utilizes a single ADS on the join attribute, (ii) Authenticated Index Merge Join (AIM) that requires an ADS (on the join attribute) for both relations, and (iii) Authenticated Sort Merge Join (ASM), which does not rely on any ADS. We experimentally demonstrate that the proposed methods outperform two benchmark algorithms, often by several orders of magnitude, on all performance metrics, and effectively shift the workload to the outsourcing service. Finally, we extend our techniques to complex queries that combine multi-way joins with selections and projections.

References

[1]
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y. Order Preserving Encryption for Numeric Data. SIGMOD, 2004.
[2]
Anciaux, N., Benzine, M., Bouganim, L., Pucheral, P., Shasha, D. GhostDB: Querying Visible and Hidden Data Without Leaks. SIGMOD, 2007.
[3]
Atallah, M., Cho, Y., Kundu, A. Efficient Data Authentication in an Environment of Untrusted Third-Party Distributors. ICDE, 2008.
[4]
Babu, S., Bizarro, P., DeWitt, D. Proactive Re-Optimization. SIGMOD, 2005.
[5]
Damiani, E., Vimercati, C., Jajodia, S., Paraboschi, S., Samarati, P. Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs. CCS, 2003.
[6]
Devanbu, P., Gertz, M., Martel, C., Stubblebine, S. Authentic Third-party Data Publication. DBSec, 2000.
[7]
Ge, T., Zdonik, S. Light-weight, Runtime Verification of Query Sources. ICDE, 2009.
[8]
Hac1gümüş, H., Iyer, B., Mehrotra, S. Providing Databases as a Service. ICDE, 2002.
[9]
http://www.openssl.org
[10]
Huebsch, R., Hellerstein, J., Lanham, N., Loo, B., Shenker, S., Stoica, I. Querying the Internet with PIER. VLDB, 2003.
[11]
Kundu, A., Bertino, E. Structural Signatures for Tree Data Structures. VLDB, 2008.
[12]
Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L. Dynamic Authenticated Index Structures for Outsourced Databases. SIGMOD, 2006.
[13]
Li, F., Yi, K., Hadjieleftheriou, M., Kollios, G. Proof-Infused Streams: Enabling Authentication of Sliding Window Queries on Streams. VLDB, 2007.
[14]
Luo, Q., Krishnamurthy, S., Mohan, C., Pirahesh, H., Woo, H., Lindsay, B., Naughton, J. F. Middle-Tier Database Caching for e-Business. SIGMOD, 2002.
[15]
Martel, C., Nuckolls, G., Devanbu, P., Gertz, M., Kwong, A., Stubblebine, S. A General Model for Authenticated Data Structures. Algorithmica, 39(1): 21--41, 2004.
[16]
Menezes, A., van Oorschot, P., Vanstone, S. Handbook of Applied Cryptography. CRC Press, 1996.
[17]
Merkle, R. A Certified Digital Signature. CRYPTO, 1989.
[18]
Narasimha M., Tsudik G. Authentication of Outsourced Databases Using Signature Aggregation and Chaining. DASFAA, 2006.
[19]
Pang, H., Jain, A., Ramamritham, K., Tan, K.-L. Verifying Completeness of Relational Query Results in Data Publishing. SIGMOD, 2005.
[20]
Pang, H., Tan, K.-L. Authenticating Query Results in Edge Computing. ICDE, 2004.
[21]
Papadopoulos, S., Yang, Y., Papadias, D. CADS: Continuous Authentication on Data Streams. VLDB, 2007.
[22]
Raman, V., Qiao, L., Han, W., Narang, I. S., Chen, Y. L., Yang, K. H., Ling, F. L. Lazy, Adaptive RID-List Intersection, and Its Application to Index Anding. SIGMOD, 2007.
[23]
Sion, R. Query Execution Assurance for Outsourced Databases. VLDB, 2005.
[24]
Xie, M., Wang, H., Yin, J., Meng, X. Integrity Auditing of Outsourced Data. VLDB, 2007.
[25]
Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G. Spatial Outsourcing for Location-based Services. ICDE, 2008.

Cited By

View all
  • (2024)Research progress of verifiable technologies for outsourcing servicesSCIENTIA SINICA Informationis10.1360/SSI-2022-036054:3(514)Online publication date: 6-Mar-2024
  • (2024)Authenticated Subgraph Matching in Hybrid-Storage Blockchains2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00159(1986-1998)Online publication date: 13-May-2024
  • (2024)Authenticated Keyword Search on Large-Scale Graphs in Hybrid-Storage Blockchains2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00155(1958-1971)Online publication date: 13-May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGMOD '09: Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
June 2009
1168 pages
ISBN:9781605585512
DOI:10.1145/1559845
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 June 2009

Permissions

Request permissions for this article.

Check for updates

Badges

Author Tags

  1. database outsourcing
  2. join algorithms
  3. query authentication

Qualifiers

  • Research-article

Conference

SIGMOD/PODS '09
Sponsor:
SIGMOD/PODS '09: International Conference on Management of Data
June 29 - July 2, 2009
Rhode Island, Providence, USA

Acceptance Rates

Overall Acceptance Rate 785 of 4,003 submissions, 20%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)37
  • Downloads (Last 6 weeks)2
Reflects downloads up to 06 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Research progress of verifiable technologies for outsourcing servicesSCIENTIA SINICA Informationis10.1360/SSI-2022-036054:3(514)Online publication date: 6-Mar-2024
  • (2024)Authenticated Subgraph Matching in Hybrid-Storage Blockchains2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00159(1986-1998)Online publication date: 13-May-2024
  • (2024)Authenticated Keyword Search on Large-Scale Graphs in Hybrid-Storage Blockchains2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00155(1958-1971)Online publication date: 13-May-2024
  • (2024) Lightweight verifiable blockchain top- queries Future Generation Computer Systems10.1016/j.future.2024.03.011156(105-115)Online publication date: Jul-2024
  • (2024)Dynamic authenticated keyword search in hybrid-storage blockchainFuture Generation Computer Systems10.1016/j.future.2024.01.026155(53-65)Online publication date: Jun-2024
  • (2024)Query Integrity in Smart EnvironmentsSecurity and Privacy in Smart Environments10.1007/978-3-031-66708-4_2(25-48)Online publication date: 29-Oct-2024
  • (2023)A Dynamic-Efficient Structure for Secure and Verifiable Location-Based Skyline QueriesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2022.322466618(920-935)Online publication date: 2023
  • (2023)Parallel Integrity Authentication Data Structure Construction for Encrypted Range Queries2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00074(319-327)Online publication date: 21-Dec-2023
  • (2023)E2VQ: Enabling Expressive, Efficient, and Verifiable Queries over Blockchain Databases2023 IEEE International Conference on Data Mining Workshops (ICDMW)10.1109/ICDMW60847.2023.00094(682-690)Online publication date: 4-Dec-2023
  • (2023)Query Authentication Using Intel SGX for Blockchain Light ClientsJournal of Computer Science and Technology10.1007/s11390-022-1007-238:3(714-734)Online publication date: 30-May-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media