期刊文献+

云计算中偏好top-k查询的正确性验证 被引量:1

Correctness authentication of preference top-k query in cloud computing
下载PDF
导出
摘要 为解决云计算环境下偏好top-k查询结果的正确性验证问题,在现有支配图的基础上,提出了基于哈希的验证支配图(ADG-H)和基于数字签名的验证支配图(ADG-S)。ADGH能够有效地对一次性查询进行验证。而对于连续监控,采用ADG-H会引起大量的网络传输,因此提出了ADG-S,只有当数据更新影响到查询结果或验证对象时才进行必要的网络传输。实验表明了ADG-H和ADG-S的有效性。 The problem of correctness of authenticating results of preference top-k query in cloud computing is investigated. On the basis of existing dominant graph, Authenticated Dominant Graph with Hash (ADG-H) and Authenticated Dominant Graph with Signature (ADG-S) are proposed. ADG-H can be used to authenticate the result correctness of snapshot query effectively. For continuous monitor, an adoptation of ADG-H can incur prohibitive network overhead, so ADG-S was proposed, by which necessary network transmission can be conducted only when the query results or verification objects are affected by data update. Extensive experiments demonstrate the effectiveness of the proposed ADG-H and ADG-S.
出处 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2014年第1期164-170,共7页 Journal of Jilin University:Engineering and Technology Edition
基金 国家自然科学基金项目(61170169 61170168 61100028) 新世纪优秀人才支持计划项目(NCET-11-0085) 中央高校基本科研业务费基金项目(N110404017)
关键词 计算机应用 偏好top-k查询 验证对象 支配图 连续监控 computer application preference top-k query verification object dominant graph continuous monitor
  • 相关文献

参考文献3

二级参考文献47

  • 1Cheng W, Pang H, Tan K. Authenticating multidimensional query results in data publishing [C] // LNCS4127: Proc of the 20th IFIP 11. 3 Working Conf on Data and Applications Security (DBSEC 2006). Berlin: Springer, 2006:60-73.
  • 2Devanbu P, Gertz M, Martel C, et al. Stubblebine. Authentic third-party data publication [OL]. p2009-06-05]. http://seelab, cs. ucdavis.edu/-devanbu/authdbpub, pdf.
  • 3Merkle R C. A certified digital signature [C] //LNCS435: Proc of the 9th Annual Int Cryptology Conf on Advances in Cryptology (CRYPTO 1989). Berlin: Springer, 1989: 218- 238.
  • 4Li F, Hadjieleftheriou M, et al. Dynamic authenticated index structures for outsourced databases [C]//Proc of the 2006 ACM SIGMOD Int Conf on Management of Data (SIGMOD 2006). New York: ACM, 2006:121-132.
  • 5Li F, Yi K, Hadjieleftheriou M, et al. Proof-infused streams: Enabling authentication of sliding windows queries on streams [C] //Proc of the 33rd Int Conf on Very Large Data Bases ( VLDB 2007 ): Vienna, Austria: VLDB Endowment, 2007: 147-158.
  • 6Yang Y, Papadopoulos S, Papadias D, et al. Spatial outsourcing for location-based services [C] //Proc of the 24th Int Conf on Data Engineering CA: IEEE Computer Society, (ICDE 2008). Los Alamitos, 2008: 1082-1091.
  • 7Mykletun E, Tsudik G. Aggregation queries in the databaseas-a-service model [C]//LNCS4127: Proc of the 20th IFIP 11. 3 Working Conf on Data and Applications Security (DBSEC 2006). Berlin: Springer, 2006:89-103.
  • 8Mykletun E, Narasimha M, Tsudik G. Authentication and integrity in outsourced databases [J]. ACM Trans on Storage, 2006, 2(2) : 107-138.
  • 9Narasimha M, Tsudik G. DSAC: Integrity of outsourced databases with signature aggregation and chaining [C]//Proc of the ACM Conf on Information and Knowledge Management. New York: ACM, 2005:235-236.
  • 10Pang H, Tan K -L. Authenticating query results in edge computing [C] //Proc of the 20th Int Conf on Data Engineering. Los Alamitos, CA: IEEE Computer Society, 2004: 560-571.

共引文献33

同被引文献1

  • 1Wei-Shinn Ku,Ling Hu,Cyrus Shahabi,Haixun Wang.A query integrity assurance scheme for accessing outsourced spatial databases[J].GeoInformatica.2013(1)

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部