Format:
1 Online-Ressource (105 Seiten)
Edition:
Also available in print
ISBN:
9781608457663
Series Statement:
Synthesis Lectures on Data Management #24
Content:
In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers. This book introduces various notions that the research community has studied for defining the correctness of a query answer. In particular, it is important to guarantee the completeness, authenticity and minimality of the answer, as well as its freshness. We present authentication mechanisms for a wide variety of queries in the context of relational and spatial databases, text retrieval, and data streams. We also explain the cryptographic protocols from which the authentication mechanisms derive their security properties
Content:
2. Cryptography foundation -- 2.1 Cryptographic protocols -- 2.2 Cost of cryptographic protocols --
Content:
1. Introduction -- 1.1 System and threat models -- 1.2 Cost factors -- 1.3 Organization --
Content:
3. Relational queries -- 3.1 Background -- 3.2 Selection query -- 3.2.1 Overview of authentication techniques for range selection -- 3.2.2 Merkle hash tree technique -- 3.2.3 Signature aggregation technique -- 3.3 Projection query -- 3.4 Join query -- 3.5 Aggregation query -- 3.5.1 Partial sum hierarchy -- 3.5.2 Certified partial sum hierarchy -- 3.5.3 Query processing using the partial sum hierarchy -- 3.5.4 Data organization -- 3.5.5 Extension to other aggregation functions -- 3.5.6 Other techniques related to aggregation query -- 3.6 Summary --
Content:
4. Spatial queries -- 4.1 Background -- 4.2 Authenticating window query -- 4.2.1 Merkle hash-based schemes -- 4.2.2 Signature-chain based schemes -- 4.3 Authenticating kNN/range query -- 4.3.1 A computational geometry approach -- 4.3.2 A signature-based scheme -- 4.4 Authenticating reverse nearest neighbor queries -- 4.5 Summary --
Content:
5. Text search queries -- 5.1 Background on text search -- 5.2 Problem formulation -- 5.3 Choice of authentication approach -- 5.4 Threshold with random access -- 5.4.1 Authentication with Merkle hash trees -- 5.4.2 Authentication with chain Merkle hash trees -- 5.5 Threshold with no random access -- 5.6 Summary --
Content:
6. Data streams -- 6.1 Data stream model -- 6.2 Tumbling Merkle tree -- 6.2.1 TM-tree construction -- 6.2.2 One-shot selection queries -- 6.2.3 Sliding window selection queries -- 6.2.4 Aggregation queries -- 6.3 Continuous monitoring of Tuples in a selection range -- 6.4 Summary --
Content:
7. Conclusion -- Bibliography -- Authors' biographies
Note:
Description based upon print version of record
,
Preface; Acknowledgments; Introduction; System and Threat Models; Cost Factors; Organization; Cryptography Foundation; Cryptographic Protocols; Cost of Cryptographic Protocols; Relational Queries; Background; Selection Query; Overview of Authentication Techniques for Range Selection; Merkle Hash Tree Technique; Signature Aggregation Technique; Projection Query; Join Query; Aggregation Query; Partial Sum Hierarchy; Certified Partial Sum Hierarchy; Query Processing using the Partial Sum Hierarchy; Data Organization; Extension to Other Aggregation Functions
,
Other Techniques Related To Aggregation QuerySummary; Spatial Queries; Background; Authenticating Window Query; Merkle Hash-based Schemes; Signature-Chain based Schemes; Authenticating kNN/Range Query; A Computational Geometry Approach; A Signature-based Scheme; Authenticating Reverse Nearest Neighbor Queries; Summary; Text Search Queries; Background on Text Search; Problem Formulation; Choice of Authentication Approach; Threshold with Random Access; Authentication with Merkle Hash Trees; Authentication with Chain Merkle Hash Trees; Threshold with No Random Access; Summary; Data Streams
,
Data Stream ModelTumbling Merkle Tree; TM-Tree Construction; One-Shot Selection Queries; Sliding Window Selection Queries; Aggregation Queries; Continuous Monitoring of Tuples in a Selection Range; Summary; Conclusion; Bibliography; Authors' Biographies;
,
Also available in print.
,
Mode of access: World Wide Web.
,
System requirements: Adobe Acrobat Reader.
Additional Edition:
ISBN 9781608457656
Additional Edition:
Print version Query Answer Authentication
Language:
English
Keywords:
Electronic books
DOI:
10.2200/S00405ED1V01Y201202DTM024
Bookmarklink