AuthenticatedJoinProcessingin.PDFVIP

  • 5
  • 0
  • 约 13页
  • 2017-05-05 发布于湖北
  • 举报
AuthenticatedJoinProcessingin

Authenticated Join Processing in Outsourced Databases Yin Yang1 Dimitris Papadias1 Stavros Papadopoulos1 Panos Kalnis2 1Department of Computer Science and Engineering 2 Division of Math. and Computer Sciences and Engineering Hong Kong University of Science and Technology King Abdullah University of Science and Technology Clear Water Bay, Hong Kong Saudi Arabia {yini, dimitris, stavros}@cse.ust.hk panos.kalnis@.sa ABSTRACT queries to clients. Authenticated query processing enables the Database outsourcing requires that a query server constructs a DSP to prove the correctness of the results. Existing methods are proof of result correctness, which can be verified by the client based on the secret/public key framework. Specifically, the DSP using the data owner’s signature. Previous authentication indexes the signed data using an authenticated data structure techniques deal with range queries on a single relation using an (ADS). During query processing, it traverses the ADS and returns authenticated data structure (ADS). On the other hand, a verification object (VO) that includes the actual result and authenticated join processing is inherently more complex than additional verification information. The VO is transmitted to the ranges since only the base relations (but not their combination) client, which can establish soundness and completeness using the are signed by the owner. In this paper, we present three novel join public key of the owner. Soundness means that every record in algorithms depending on the ADS availability: (i) Authenticated the result set is present in the owner’s database and not altered. Indexed Sort Merge Join (AISM), which utilizes a single ADS on Completeness means that all valid results are included. the join a

文档评论(0)

1亿VIP精品文档

相关文档