- 5
- 0
- 约 13页
- 2017-05-05 发布于湖北
- 举报
AuthenticatedJoinProcessingin
Authenticated Join Processing in Outsourced Databases
Yin Yang1 Dimitris Papadias1 Stavros Papadopoulos1 Panos Kalnis2
1Department of Computer Science and Engineering 2 Division of Math. and Computer Sciences and Engineering
Hong Kong University of Science and Technology King Abdullah University of Science and Technology
Clear Water Bay, Hong Kong Saudi Arabia
{yini, dimitris, stavros}@cse.ust.hk panos.kalnis@.sa
ABSTRACT queries to clients. Authenticated query processing enables the
Database outsourcing requires that a query server constructs a DSP to prove the correctness of the results. Existing methods are
proof of result correctness, which can be verified by the client based on the secret/public key framework. Specifically, the DSP
using the data owner’s signature. Previous authentication indexes the signed data using an authenticated data structure
techniques deal with range queries on a single relation using an (ADS). During query processing, it traverses the ADS and returns
authenticated data structure (ADS). On the other hand, a verification object (VO) that includes the actual result and
authenticated join processing is inherently more complex than additional verification information. The VO is transmitted to the
ranges since only the base relations (but not their combination) client, which can establish soundness and completeness using the
are signed by the owner. In this paper, we present three novel join public key of the owner. Soundness means that every record in
algorithms depending on the ADS availability: (i) Authenticated the result set is present in the owner’s database and not altered.
Indexed Sort Merge Join (AISM), which utilizes a single ADS on Completeness means that all valid results are included.
the join a
原创力文档

文档评论(0)