2006
DOI: 10.1145/1149976.1149977
|View full text |Cite
|
Sign up to set email alerts
|

Authentication and integrity in outsourced databases

Abstract: In the Outsourced Database (ODB) model, entities outsource their data management needs to a third-party service provider. Such a service provider offers mechanisms for its clients to create, store, update, and access (query) their databases. This work provides mechanisms to ensure data integrity and authenticity for outsourced databases. Specifically, this article provides mechanisms that assure the querier that the query results have not been tampered with and are authentic (with respect to the actual data ow… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
216
0

Year Published

2006
2006
2015
2015

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 255 publications
(217 citation statements)
references
References 9 publications
1
216
0
Order By: Relevance
“…These solutions are based on the adoption of authenticated data structures or on probabilistic approaches. Approaches that rely on authenticated data structures (e.g., Merkle trees [12] and signature-based schemas [13]) return, together with the query result, a verification object that is used by the client to verify the correctness and completeness of the result. Authenticated data structures provide deterministic guarantees but they are defined over a specific attribute and only queries operating on it can be verified.…”
Section: Related Workmentioning
confidence: 99%
“…These solutions are based on the adoption of authenticated data structures or on probabilistic approaches. Approaches that rely on authenticated data structures (e.g., Merkle trees [12] and signature-based schemas [13]) return, together with the query result, a verification object that is used by the client to verify the correctness and completeness of the result. Authenticated data structures provide deterministic guarantees but they are defined over a specific attribute and only queries operating on it can be verified.…”
Section: Related Workmentioning
confidence: 99%
“…Hence, only correctness and completeness are considered. In addition, most of these research activities have been done theoretically [6,12]. Recently, in [13,14], the authors mentioned about freshness, and carried out the evaluations with real datasets.…”
Section: Figure 1 Odbs Modelmentioning
confidence: 99%
“…As presented in section 2.2, to achieve correctness, each tuple of a relation is signed by a private-key with a digital signature algorithm [6,9,14,18]. The signature is stored along with the tuple.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, this ODBS model also introduces numerous research challenges and thus has rapidly become one of the most active topics in the research community. 3,4,5,6,7,8,9,10 As mentioned, in the ODBS model, a client stores its private data at an external service provider who is typically not fully trusted. On the other hand, in this digital age, for most clients, databases take a critical role related directly to their existence and development.…”
Section: Introductionmentioning
confidence: 99%