skip to main content
10.1145/2463676.2465281acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
research-article

Lightweight authentication of linear algebraic queries on data streams

Published: 22 June 2013 Publication History

Abstract

We consider a stream outsourcing setting, where a data owner delegates the management of a set of disjoint data streams to an untrusted server. The owner authenticates his streams via signatures. The server processes continuous queries on the union of the streams for clients trusted by the owner. Along with the results, the server sends proofs of result correctness derived from the owner's signatures, which are easily verifiable by the clients. We design novel constructions for a collection of fundamental problems over streams represented as linear algebraic queries. In particular, our basic schemes authenticate dynamic vector sums and dot products, as well as dynamic matrix products. These techniques can be adapted for authenticating a wide range of important operations in streaming environments, including group by queries, joins, in-network aggregation, similarity matching, and event processing. All our schemes are very lightweight, and offer strong cryptographic guarantees derived from formal definitions and proofs. We experimentally confirm the practicality of our schemes.

References

[1]
D. Abadi, D. Carney, U. Çetintemel, M. Cherniack, C. Convey, C. Erwin, E. Galvez, M. Hatoun, A. Maskey, A. Rasin, A. Singer, M. Stonebraker, N. Tatbul, Y. Xing, R. Yan, and S. Zdonik. Aurora: A Data Stream Management System. In SIGMOD, 2003.
[2]
S. Agrawal and D. Boneh. Homomorphic MACs: MAC-Based Integrity for Network Coding. In ACNS, 2009.
[3]
A. Arasu, B. Babcock, S. Babu, M. Datar, K. Ito, I. Nishizawa, J. Rosenstein, and J. Widom. STREAM: The Stanford Stream Data Manager (demonstration description). In SIGMOD, 2003.
[4]
D. Boneh and D. M. Freeman. Homomorphic Signatures for Polynomial Functions. In EUROCRYPT, 2011.
[5]
J. Camenisch, M. Kohlweiss, and C. Soriente. An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials. In PKC, 2009.
[6]
A. Chakrabarti, G. Cormode, and A. McGregor. Annotations in Data Streams. In ICALP, 2009.
[7]
G. Cormode, J. Thaler, and K. Yi. Verifying computations with streaming interactive proofs. In VLDB, 2012.
[8]
C. Cranor, T. Johnson, O. Spatscheck, and V. Shkapenyuk. Gigascope: A Stream Database for Network Applications. In SIGMOD, 2003.
[9]
A. Das, J. Gehrke, and M. Riedewald. Approximate Join Processing Over Data Streams. In SIGMOD, 2003.
[10]
A. J. Demers, J. Gehrke, B. Panda, M. Riedewald, V. Sharma, and W. M. White. Cayuga: A general purpose event monitoring system. In CIDR, 2007.
[11]
P. Devanbu, M. Gertz, C. Martel, and S. G. Stubblebine. Authentic Data Publication over the Internet. J. Comput. Secur., 11(3):291--314, 2003.
[12]
M. N. Garofalakis, J. M. Hellerstein, and P. Maniatis. Proof Sketches: Verifiable In-Network Aggregation. In ICDE, 2007.
[13]
O. Goldreich. The Foundations of Cryptography - Volume 1, Basic Techniques. Cambridge University Press, 2001.
[14]
S. Goldwasser, Y. T. Kalai, and G. N. Rothblum. Delegating Computation: Interactive Proofs for Muggles. In STOC, 2008.
[15]
J. Katz and Y. Lindell. Introduction to Modern Cryptography. Chapman and Hall/CRC Press, 2007.
[16]
F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin. Dynamic Authenticated Index Structures for Outsourced Databases. In SIGMOD, 2006.
[17]
F. Li, K. Yi, M. Hadjieleftheriou, and G. Kollios. Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams. In VLDB, 2007.
[18]
S. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong. Tag: a tiny aggregation service for ad-hoc sensor networks. In OSDI, 2002.
[19]
A. J. Menezes, S. A. Vanstone, and P. C. V. Oorschot. Handbook of Applied Cryptography. CRC Press, Inc., 1996.
[20]
Microsoft. StreamInsight. http://msdn.microsoft.com/en-us/library/ee362541.aspx, 2010.
[21]
H. Nasgaard, B. Gedik, M. Komor, and M. P. Mendell. IBM Infosphere Streams: Event Processing for a Smarter Planet. In CASCON, 2009.
[22]
S. Nath and R. Venkatesan. Publicly Verifiable Grouped Aggregation Queries on Outsourced Data Streams. In ICDE, 2013.
[23]
S. Nath, H. Yu, and H. Chan. Secure Outsourced Aggregation via One-way Chains. In SIGMOD, 2009.
[24]
H. Pang, A. Jain, K. Ramamritham, and K.-L. Tan. Verifying Completeness of Relational Query Results in Data Publishing. In SIGMOD, 2005.
[25]
H. Pang and K.-L. Tan. Authenticating Query Results in Edge Computing. In ICDE, 2004.
[26]
S. Papadopoulos, A. Kiayias, and D. Papadias. Secure and Efficient In-Network Processing of Exact SUM Queries. In ICDE, 2011.
[27]
S. Papadopoulos, Y. Yang, and D. Papadias. CADS: Continuous Authentication on Data Streams. In VLDB, 2007.
[28]
V. Shoup. Lower Bounds for Discrete Logarithms and Related Problems. In EUROCRYPT, 1997.
[29]
S. Viglas, J. F. Naughton, and J. Burger. Maximizing the Output Rate of Multi-Way Join Queries over Streaming Information Sources. In VLDB, 2003.
[30]
Y. Yang, D. Papadias, S. Papadopoulos, and P. Kalnis. Authenticated Join Processing in Outsourced Databases. In SIGMOD, 2009.
[31]
K. Yi, F. Li, G. Cormode, M. Hadjieleftheriou, G. Kollios, and D. Srivastava. Small Synopses for Group-by Query Verification on Outsourced Data Streams. TODS, 34(3), 2009.

Cited By

View all
  • (2024)Research progress of verifiable technologies for outsourcing servicesSCIENTIA SINICA Informationis10.1360/SSI-2022-036054:3(514)Online publication date: 6-Mar-2024
  • (2023)Verify De-Duplication Using Blockchain on Data with Smart Contract Techniques for Detecting Errors on CloudExpert Clouds and Applications10.1007/978-981-99-1745-7_64(885-896)Online publication date: 2-Jul-2023
  • (2021)Integrity Checking for Aggregate QueriesIEEE Access10.1109/ACCESS.2021.30797999(74068-74084)Online publication date: 2021
  • Show More Cited By

Index Terms

  1. Lightweight authentication of linear algebraic queries on data streams

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SIGMOD '13: Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data
      June 2013
      1322 pages
      ISBN:9781450320375
      DOI:10.1145/2463676
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 22 June 2013

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. data integrity
      2. data streams
      3. query authentication

      Qualifiers

      • Research-article

      Conference

      SIGMOD/PODS'13
      Sponsor:

      Acceptance Rates

      SIGMOD '13 Paper Acceptance Rate 76 of 372 submissions, 20%;
      Overall Acceptance Rate 785 of 4,003 submissions, 20%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)8
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 07 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Research progress of verifiable technologies for outsourcing servicesSCIENTIA SINICA Informationis10.1360/SSI-2022-036054:3(514)Online publication date: 6-Mar-2024
      • (2023)Verify De-Duplication Using Blockchain on Data with Smart Contract Techniques for Detecting Errors on CloudExpert Clouds and Applications10.1007/978-981-99-1745-7_64(885-896)Online publication date: 2-Jul-2023
      • (2021)Integrity Checking for Aggregate QueriesIEEE Access10.1109/ACCESS.2021.30797999(74068-74084)Online publication date: 2021
      • (2020)Privacy-Preserving Lightweight Data Monitoring in Internet of Things EnvironmentsWireless Personal Communications10.1007/s11277-020-07760-x116:3(1765-1783)Online publication date: 31-Aug-2020
      • (2019)Improved publicly verifiable group sum evaluation over outsourced data streams in IoT settingComputing10.1007/s00607-018-0641-6101:7(773-790)Online publication date: 1-Jul-2019
      • (2019)IoT SecurityTowards the Internet of Things10.1007/978-3-030-18468-1_3(33-83)Online publication date: 13-Jun-2019
      • (2018)Authenticating Aggregate Queries over Set-Valued Data with ConfidentialityIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2017.277354130:4(630-644)Online publication date: 1-Apr-2018
      • (2018)Publicly Verifiable 1-norm and 2-norm Operations over Outsourced Data Stream Under Single-Key SettingAdvances in Internet, Data & Web Technologies10.1007/978-3-319-75928-9_41(462-469)Online publication date: 24-Feb-2018
      • (2017)Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple KeysIEEE Transactions on Services Computing10.1109/TSC.2016.253166510:5(826-838)Online publication date: 1-Sep-2017
      • (2017)Assuring Spatio-Temporal Integrity on Mobile Devices with Minimum Location DisclosureIEEE Transactions on Mobile Computing10.1109/TMC.2017.268349216:11(3000-3013)Online publication date: 1-Nov-2017
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media