2021
DOI: 10.1109/tkde.2019.2947061
|View full text |Cite
|
Sign up to set email alerts
|

Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey

Abstract: Spurred by the development of cloud computing, there has been considerable recent interest in the Database-as-a-Service (DaaS) paradigm. Users lacking in expertise or computational resources can outsource their data and database management needs to a third-party service provider. Outsourcing, however, raises an important issue of result integrity: how can the client verify with lightweight overhead that the query results returned by the service provider are correct (i.e., the same as the results of query execu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
3
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 67 publications
0
3
0
Order By: Relevance
“…This scheme utilizes Kronecker product phenomenon. Bo Zhang et al [24] focuses on sorting and classifying reviewing the status of existing techniques for ensuring the probity of SQL query oriented evaluation results in the particular DaaS paradigm. Yanguo P. et al [25] proposed the secure the near approximate k-Nearest Neighbour query-module over the encoded format high-dimensional natured data.…”
Section: Related Workmentioning
confidence: 99%
“…This scheme utilizes Kronecker product phenomenon. Bo Zhang et al [24] focuses on sorting and classifying reviewing the status of existing techniques for ensuring the probity of SQL query oriented evaluation results in the particular DaaS paradigm. Yanguo P. et al [25] proposed the secure the near approximate k-Nearest Neighbour query-module over the encoded format high-dimensional natured data.…”
Section: Related Workmentioning
confidence: 99%
“…In the past decade, much research work has been emerged on the field of database outsourcing. There are many existing solutions to solve related problems such as completeness guarantee of query results [3]. In this paper, we propose an authentication scheme based on Merkle Hash Tree (MHT), which is a widely used binary tree authenticated structure, as shown in Fig.…”
Section: Related Workmentioning
confidence: 99%
“…In [12]- [14], the authors proposed a verification scheme to solve the problem of verifying the results of spatial multi-user queries. Multiple SQL query verification schemes are described in [3]. In [15], [16], they cannot only ensure the correctness and completeness of query results, but also support the verification of query results on dynamic data sets.…”
Section: Related Workmentioning
confidence: 99%
“…GriDB considers an outsourced database scenario [35,58] in which the clients outsource their data management to the blockchain. The nodes host the client's databases and the clients send requests to the nodes to create, store, update and query their databases.…”
Section: System Modelmentioning
confidence: 99%