作者
Feifei Li, Ke Yi, Marios Hadjieleftheriou, George Kollios
发表日期
2007/9/23
图书
Proceedings of the 33rd international conference on Very large data bases
页码范围
147-158
简介
As computer systems are essential components of many critical commercial services, the need for secure online transactions is now becoming evident. The demand for such applications, as the market grows, exceeds the capacity of individual businesses to provide fast and reliable services, making outsourcing technologies a key player in alleviating issues of scale. Consider a stock broker that needs to provide a real-time stock trading monitoring service to clients. Since the cost of multicasting this information to a large audience might become prohibitive, the broker could outsource the stock feed to third-party providers, who are in turn responsible for forwarding the appropriate sub-feed to clients. Evidently, in critical applications the integrity of the thirdparty should not be taken for granted. In this work we study a variety of authentication algorithms for selection and aggregation queries over sliding windows. Our algorithms enable the end-users to prove that the results provided by the third-party are correct, ie, equal to the results that would have been computed by the original provider. Our solutions are based on Merkle hash trees over a forest of space partitioning data structures, and try to leverage key features, like update, query, signing, and authentication costs. We present detailed theoretical analysis for our solutions and empirically evaluate the proposed techniques.
引用总数
20062007200820092010201120122013201420152016201720182019202020212022202320241398981193684346571
学术搜索中的文章
F Li, K Yi, M Hadjieleftheriou, G Kollios - Proceedings of the 33rd international conference on …, 2007