Proceedings. 20th International Conference on Data Engineering
DOI: 10.1109/icde.2004.1320027
|View full text |Cite
|
Sign up to set email alerts
|

Authenticating query results in edge computing

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
147
0

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 164 publications
(147 citation statements)
references
References 12 publications
(20 reference statements)
0
147
0
Order By: Relevance
“…We compare three different range query verification methods, Authentic Publication proposed by Devanbu, et al in [6], Pang and Tan's verifiable B-tree (VB tree) in [17] and the proposals in this paper. We focus on Client proof overhead and verification cost and then consider the effect of bandwidth.…”
Section: Performance Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…We compare three different range query verification methods, Authentic Publication proposed by Devanbu, et al in [6], Pang and Tan's verifiable B-tree (VB tree) in [17] and the proposals in this paper. We focus on Client proof overhead and verification cost and then consider the effect of bandwidth.…”
Section: Performance Comparisonmentioning
confidence: 99%
“…In the original Authentic Publication method, proof size depends on the number of data points in the answer and the tree height, O(log N ) additional hash values for a tree over N data points. Pang and Tan [17] proposed to eliminate this dependence on tree height with the verifiable B-tree (VB tree). This requires some degree of trust in the Publisher, relies heavily on Owner signatures and a proposed one-way digest function based on modular exponentiation.…”
Section: Introductionmentioning
confidence: 99%
“…-removes the single point of failure in the infrastructure by lowering the dependency to the corporate data center, hence reducing its http://journals.uob.edu.bh susceptibility to denial of service attacks and improving service availability [34].…”
Section: ) Goalsmentioning
confidence: 99%
“…Edge computing is a natural extension of the Content Delivery Network (CDN) architecture [34] [35]. It pushes application logic and the underlying data processing from corporate data centers out to proxy servers at the "edge" of the network in order to achieve scalable and highly available Web services [34] and for better efficiency and performance [36].…”
Section: Edge Computingmentioning
confidence: 99%
See 1 more Smart Citation