期刊文献+

外包数据库中的哈希连接一致性算法 被引量:1

Algorithm for Authenticated Hash Join Processing in Outsourced Database
下载PDF
导出
摘要 外包数据库中的连接查询比范围查询更困难,因为客户端需要验证连接结果的一致性,而传统的对单个表的签名不能有效地支持对连接查询结果的直接验证。提出了使用哈希连接保证数据一致性的2种算法,它们分别通过在服务器端和客户端计算哈希函数来实现连接查询。给出了这2种算法的详细描述,证明了它们满足一致性要求,而且分析了算法在通信量、服务器端和客户端执行的代价。最后在实验中通过设置不同的参数对它们在服务器端和客户端的运行时间进行了比较,总结了它们在实际应用中的优缺点。 In outsourced database,authenticated join processing is more difficult than authenticated rang queries because the previous approach for signature on a single relation can not be used to verify join results directly.This paper providedtwo kinds of authenticated hash join processing algorithms,which respectively compute hash functions by database service provider and by client.These two methods were described in detail and proved to guarantee the authenticity of join results.The analysis of the performance was presented with respect to cost factors,such as communication cost,server-side cost and client-side cost.Finally,we experimentally compared the two methods on the running time of server-side and client-side in different parameters and summarized their advantages and disadvantages in the application.
出处 《计算机科学》 CSCD 北大核心 2012年第2期198-202,221,共6页 Computer Science
基金 国家自然科学基金(60773175 60973134和70971043) 现代通信国家重点实验室基金(9140C1108020906) 广东省自然科学基金(10351806001000000 10151064201000028和9151064201000058)资助
关键词 数据库安全 外包数据库 哈希连接 数据一致性 Database security Outsourced database Hash join Data authenticity
  • 相关文献

参考文献19

  • 1Hacigumus H,et al.Executing SQL over encrypted data in thedatabase-service-provider model[C]∥Proceedings of the ACMSIGMOD International Conference on Managment of Data.Madi-son,WI,United states,June 2002:216-227.
  • 2田秀霞,王晓玲,高明,周傲英.数据库服务——安全与隐私保护[J].软件学报,2010,21(5):991-1006. 被引量:61
  • 3Agrawal R,et al.Order preserving encryption for numeric data[C]∥Proceedings of the ACM SIGMOD International Confe-renceon Management of Data(SIGMOD 2004).Paris,France,June2004:563-574.
  • 4Mykletun E,Narasimha M,Tsudik G.Authentication and inte-grity in outsourced databases[J].Trans.Storage,2006,2(2):107-138.
  • 5Xie M,et al.Integrity auditing of outsourced data.VLDB En-dowment[C]∥Proceedings of the 33rd International Conferenceon Very Large Data Bases.2007:782-793.
  • 6Narasimha M,Tsudik G.Authentication of outsourced databasesusing signature aggregation and chaining[C]∥11th InternationalConference of Database Systems for Advanced Applications.Berlin,Germany,April 2006:420-36.
  • 7Wang H,et al.Dual encryption for query integrity assurance[C]∥17th ACM Conference on Information and Knowledge Manage-ment(CIKM’08).October 26-30,2008,Napa Valley,CA,Unit-ed states,2008:863-872.
  • 8咸鹤群,冯登国.外包数据库模型中的完整性检测方案[J].计算机研究与发展,2010,47(6):1107-1115. 被引量:23
  • 9Hweehwa P,Kian-Lee T.Verifying completeness of relationalquery answers from online servers[J].ACM Transactions on In-formation and Systems Security,2008,11:9-1.
  • 10Emekci F,et al.Privacy preserving query processing using thirdparties[C]∥22nd International Conference on Data Engineering(ICDE’06).Atlanta,GA,United states,April 2006:27.

二级参考文献83

  • 1俞银燕,汤帜.数字版权保护技术研究综述[J].计算机学报,2005,28(12):1957-1968. 被引量:141
  • 2朱勤,于守健,乐嘉锦,骆轶姝.外包数据库系统安全机制研究[J].计算机科学,2007,34(2):152-156. 被引量:17
  • 3Hacigumus H, Iyer B, Mehrotra S. Providing Database as a Serviee[C]//ICDE 2002. San Jose,California,USA,2002.
  • 4Rosenblatt W, Trippe W, Mooney S. Digital Rights Manage ment: Business and Teehnology[M]. New York: M &T Books, 2002.
  • 5Garnett N. Digital Right ' s Management, Copyright, and Napster[J].ACM SIGecom Exchanges, 2001,2(2):1-5.
  • 6Epass 1 000 ND [EB/OL]. [2007-12-02]. http : / / www. ftsafe. com. cn/products/viewproduct.php? p= epasslknd, 2008.
  • 7Hacigümüs H,Mehrotra S,Iyer B.Providing database as a service.In:Proc.of the Int'l Conf.on Data Engineering.Washington:IEEE Computer Society Press,2002.29-38.
  • 8Mykletun E,Narasimha M,Tsudik G.Authentication and integrity in outsourced databases.ACM Trans.on Storage,2006,2(2):107-138.
  • 9Schneier B,Wrote; Wu SZ,Zhu SX,Zhang WZ,Trans.Applied Cryptography-Protocols,Algorithms,and Source Code in C (Second Edition).Beijing:China Machine Press,2006 (in Chinese).
  • 10Shmueli E,Waisenberg R,Elovici Y,Gudes E.Designing secure indexes for encrypted databases.In:Proc.of the IFIP Conf.on Database and Applications Security.LNCS 3654,Heidelberg,Berlin:Springer-Verlag,2005.54-68.

共引文献96

同被引文献12

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部