AuthPDB: Query Authentication for Outsourced Probabilistic Databases

08/24/2018
by   Bo Zhang, et al.
0

Spurred by developments such as cloud computing, there are increasing efforts for outsourcing of data management. A company (data owner) who lacks expertise and comptational resources can outsource his data to a third-party service provider (server), who provides storage and query evaluation on the outsourced data as the services. One of the security concerns of the outsourcing paradigm is the integrity of the returned query results on the outsourced data. In this paper, we consider the outsourcing of probabilistic databases, on which query evaluation is of high complexity. A dishonest server may return cheap (and incorrect) query answers, hoping that the client who has weak computational power cannot catch the incorrect results. To address this issue, we design efficient integrity verification methods for both all-answer and top-k query evaluation on outsourced probabilistic databases. Our empirical results demonstrate the effectiveness and efficiency of our verification methods.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/24/2018

Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey

Spurred by the development of cloud computing, there has been considerab...
research
10/07/2020

Query Rewriting On Path Views Without Integrity Constraints

A view with a binding pattern is a parameterised query on a database. Su...
research
02/20/2016

Causes for Query Answers from Databases, Datalog Abduction and View-Updates: The Presence of Integrity Constraints

Causality has been recently introduced in databases, to model, character...
research
07/15/2019

Hands Off my Database: Ransomware Detection in Databases through Dynamic Analysis of Query Sequences

Ransomware is an emerging threat which imposed a $ 5 billion loss in 201...
research
07/01/2021

VeriDL: Integrity Verification of Outsourced Deep Learning Services (Extended Version)

Deep neural networks (DNNs) are prominent due to their superior performa...
research
04/15/2020

Distributed Data Verification Protocols in Cloud Computing

Recently, storage of huge volume of data into Cloud has become an effect...
research
01/30/2018

The Reification of an Incorrect and Inappropriate Spreadsheet Model

Once information is loaded into a spreadsheet, it acquires properties th...

Please sign up or login with your details

Forgot password? Click here to reset