期刊文献+

面向分布式查询认证的分层Hash链表 被引量:3

Hierarchical Hash List for Distributed Query Authentication
下载PDF
导出
摘要 针对认证跳表、签名链等方案所存在的不足,对分布式查询认证展开研究.提出分布式查询认证的定义,给出其应满足的认证性的形式化描述.以认证跳表为基础,在考虑完备性和边界隐私保护的前提下,设计一种新的认证数据结构——分层Hash链表(hierarchical Hash list,HHL),给出了HHL的定义以及构建、认证和更新算法.通过对HHL中冗余Hash节点的分析,提出了效率更高的改进分层Hash链表(N-HHL),利用统计学方法和分层数据处理对HHL的代价进行分析,得出其拥有O(log n)代价.通过模拟敌手多种破坏数据认证性的手段,对HHL的安全性进行分析,结果表明HHL能够检测出多种破坏查询结果认证性的行为,从而证明其安全性.将HHL与已有的典型分布式查询认证方案——签名链方案——进行比较,实验数据表明HHL在认证代价方面优于签名链方案. Our research on the distributed query authentication aims at decreasing the authentication cost of the existing schemes, such as authenticated skiplist and signature chaining. Both the definition of the distributed query authentication and the formalized description of the authenticity, which has to be satisfied, are proposed in this paper. A new authenticated data structure called hierarchical Hash list (HHL), is designed to guarantee the integrity and authenticity of the answers to the query, while decreasing the computation and authentication cost as much as possible. The algorithms for its construction, authentication and updating, as well as its definition, are also designed. According to the analysis of the redundant Hash nodes in the HHL, the basic HHL is improved to be more efficient on the cost. For that reason, statistical methods and hierarchical data processing are used and the cost decreases to O(log n). The security analysis is carried out by simulating adversaries' attacks against the authenticity of the data. The analysis results show that the HHL could detect different kinds of behaviors which could destroy the authenticity of the query answers, and this also proves the proposed scheme's security. Experiments show that compared with the typical distributed query authentication scheme signature chaining, our scheme is proved more efficient on the authentication cost.
出处 《计算机研究与发展》 EI CSCD 北大核心 2012年第7期1533-1544,共12页 Journal of Computer Research and Development
基金 国家"八六三"高技术研究发展计划基金项目(2009AA01Z122) 国家自然科学基金项目(60872040) 沈阳市科学计划基金项目(F10-205-1-12) 辽宁省"百千万人才工程"基金项目(2011921071)
关键词 分布式查询 数据认证 认证数据结构 分层Hash链表 认证代价 distributed query data authentication authenticated data structures hierarchical Hash list authentication cost
  • 相关文献

参考文献17

  • 1Flocchini P,Pagli L,prencipe G. Computing all the best swap edges distributively[J].Journal of Parallel and Distributed Computing,2008,(07):976-983.doi:10.1016/j.jpdc.2008.03.002.
  • 2Angela B,Chang Elaine,Ho Terence. Schema mapping and query translation in heterogeneous P2P[J].XML Databases,2010,(02):231-256.
  • 3咸鹤群,冯登国.外包数据库模型中的完整性检测方案[J].计算机研究与发展,2010,47(6):1107-1115. 被引量:23
  • 4Xie P Min,Wang Haixun,Yin P Jian. Integrity auditing of outsourced data[A].New York:ACM,2007.24-28.doi:10.1097/MPH.0b013e3181c3a8d0.
  • 5Bogdan C,Radu S. Joining privately on outsourced data[A].Beilin:Springer-Verlag,2010.70-86.
  • 6Pang H,Jain A,Ramamritham K. Verifying completeness of relational query results in data publishing[A].New York:ACM,2005.407-418.
  • 7Mykletun E,Narasimha M,Tsudik G. Authentication and integrity in outsourced databases[J].ACM Trans on Storage,2006,(02):107-138.
  • 8Gennaro R,Rohatgi P. How to sign digital streams[A].Beilin:Springer-Verlag,1997.180197.
  • 9卿斯汉,周永彬,张振峰,刘娟.认证字典及其在PKI中的应用研究[J].电子学报,2004,32(8):1356-1359. 被引量:2
  • 10Tamassia R. Authenticated data structures[A].Beilin:Springer-Verlag,2003.2-5.

二级参考文献45

  • 1Cheng W, Pang H, Tan K. Authenticating multidimensional query results in data publishing [C] // LNCS4127: Proc of the 20th IFIP 11. 3 Working Conf on Data and Applications Security (DBSEC 2006). Berlin: Springer, 2006:60-73.
  • 2Devanbu P, Gertz M, Martel C, et al. Stubblebine. Authentic third-party data publication [OL]. p2009-06-05]. http://seelab, cs. ucdavis.edu/-devanbu/authdbpub, pdf.
  • 3Merkle R C. A certified digital signature [C] //LNCS435: Proc of the 9th Annual Int Cryptology Conf on Advances in Cryptology (CRYPTO 1989). Berlin: Springer, 1989: 218- 238.
  • 4Li F, Hadjieleftheriou M, et al. Dynamic authenticated index structures for outsourced databases [C]//Proc of the 2006 ACM SIGMOD Int Conf on Management of Data (SIGMOD 2006). New York: ACM, 2006:121-132.
  • 5Li F, Yi K, Hadjieleftheriou M, et al. Proof-infused streams: Enabling authentication of sliding windows queries on streams [C] //Proc of the 33rd Int Conf on Very Large Data Bases ( VLDB 2007 ): Vienna, Austria: VLDB Endowment, 2007: 147-158.
  • 6Yang Y, Papadopoulos S, Papadias D, et al. Spatial outsourcing for location-based services [C] //Proc of the 24th Int Conf on Data Engineering CA: IEEE Computer Society, (ICDE 2008). Los Alamitos, 2008: 1082-1091.
  • 7Mykletun E, Tsudik G. Aggregation queries in the databaseas-a-service model [C]//LNCS4127: Proc of the 20th IFIP 11. 3 Working Conf on Data and Applications Security (DBSEC 2006). Berlin: Springer, 2006:89-103.
  • 8Mykletun E, Narasimha M, Tsudik G. Authentication and integrity in outsourced databases [J]. ACM Trans on Storage, 2006, 2(2) : 107-138.
  • 9Narasimha M, Tsudik G. DSAC: Integrity of outsourced databases with signature aggregation and chaining [C]//Proc of the ACM Conf on Information and Knowledge Management. New York: ACM, 2005:235-236.
  • 10Pang H, Tan K -L. Authenticating query results in edge computing [C] //Proc of the 20th Int Conf on Data Engineering. Los Alamitos, CA: IEEE Computer Society, 2004: 560-571.

共引文献31

同被引文献13

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部