Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data 2005
DOI: 10.1145/1066157.1066204
|View full text |Cite
|
Sign up to set email alerts
|

Verifying completeness of relational query results in data publishing

Abstract: In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the publisher may be untrusted or susceptible to attacks, it could produce incorrect query results. In this paper, we introduce a scheme for users to verify that their query results are complete (i.e., no qualifying tuples are omitted) and authentic (i.e., all the result values originated from the owner). The scheme supports range selection on key and non-key attributes, project as well as join queries on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
205
0

Year Published

2009
2009
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 213 publications
(206 citation statements)
references
References 22 publications
1
205
0
Order By: Relevance
“…Nevertheless, the solution of [22] can be applied in conjunction with the proposed methods to avoid disclosure of boundary records, when the outsourced database must comply with certain access control policies. The proofs of soundness and completeness for initial result computation are identical to those of the MB-Tree [15] and omitted.…”
Section: Initial Results Computationmentioning
confidence: 99%
See 2 more Smart Citations
“…Nevertheless, the solution of [22] can be applied in conjunction with the proposed methods to avoid disclosure of boundary records, when the outsourced database must comply with certain access control policies. The proofs of soundness and completeness for initial result computation are identical to those of the MB-Tree [15] and omitted.…”
Section: Initial Results Computationmentioning
confidence: 99%
“…According to the signature chaining technique [20,22], the DO produces one signature for every triplet of adjacent tuples (sorted on their query attribute values). It then transmits its data set and signatures to the SP.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…At a high level, existing solutions addressing this problem can be divided into two main classes: deterministic and probabilistic. Deterministic approaches are based on the definition of authenticated data structures, which are structures built over specific attributes (e.g., Merkle hash trees or signature chaining schemas [38,39]). A user submits a query to a cloud provider that executes it and returns the query result along with the information necessary for the user to verify the correctness and completeness of the query result.…”
Section: Integrity Of Computationsmentioning
confidence: 99%
“…For simplicity, we consider the LBS as the adversary, but ILC is safe against any of the aforementioned types of entities. Note that ensuring the authenticity of the POIs reported to the users is outside the scope of this paper; result verification methods (e.g., [20][21][22]) could be used in conjunction with ILC to detect any man-in-the-middle tampering with the results.…”
Section: Assumptionsmentioning
confidence: 99%