skip to main content
10.1145/3412841.3442133acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
poster

Integrity guarantees over highly dynamic outsourced map data

Published:22 April 2021Publication History

ABSTRACT

Highly dynamic map data play nowadays a crucial role in different application contexts. Their huge volume often enforces the data owner to outsource them to the cloud, becoming this way the client of analytical queries computed by the cloud. Therefore, the classical problem of query integrity, usually considered in the scenario of location-based services (LBS) over outsourced databases, arises also in this different scenario. This means that the data owner should have guarantees that the cloud response to a submitted query is correct, complete, and fresh. On the one hand, the considered setting simplifies the problem, because public verifiability is no longer required, but poses new challenges, such as supporting very efficient insertions and deletions and, consequently, effective guarantees for freshness. This paper studies this problem by proposing a lightweight message-authentication-code-based approach fulfilling the above requirements better than the approaches available in the literature, according to an analytical cost evaluation.

References

  1. Weiwei Cheng, HweeHwa Pang, and Kian-Lee Tan. 2006. Authenticating multidimensional query results in data publishing. In IFIP Annual Conference on Data and Applications Security and Privacy. Springer, 60--73.Google ScholarGoogle Scholar
  2. Ling Hu, Wei-Shinn Ku, Spiridon Bakiras, and Cyrus Shahabi. 2013. Spatial query integrity with voronoi neighbors. IEEE Transactions on Knowledge and Data Engineering 25, 4 (2013), 863--876.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Hugo Krawczyk, Ran Canetti, and Mihir Bellare. 1997. HMAC: Keyed-hashing for message authentication. (1997).Google ScholarGoogle Scholar
  4. Ralph C Merkle. 1989. A certified digital signature. In Advances in Cryptology---CRYPTO'89 Proceedings. Springer, 218--238.Google ScholarGoogle Scholar
  5. HweeHwa Pang, Arpit Jain, Krithi Ramamritham, and Kian-Lee Tan. 2005. Verifying completeness of relational query results in data publishing. In Proceedings of the 2005 ACM SIGMOD international conference on Management of data. 407--418.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Dimitrios Papadopoulos, Stavros Papadopoulos, and Nikos Triandopoulos. 2014. Taking authenticated range queries to arbitrary dimensions. In Proc. of the 2014 ACM SIGSAC Conference on Computer and Communications Security. 819--830.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Pierangela Samarati. 2014. Data security and privacy in the cloud. In International Conference on Information Security Practice and Experience. Springer, 28--41.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Yin Yang, Stavros Papadopoulos, Dimitris Papadias, and George Kollios. 2009. Authenticated indexing for outsourced spatial databases. The VLDB Journal 18, 3 (2009), 631--648.Google ScholarGoogle ScholarCross RefCross Ref
  9. B. Zhang, B. Dong, and W. H. Wang. 2019. Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey. IEEE Transactions on Knowledge and Data Engineering (2019), 1--1.Google ScholarGoogle Scholar
  10. Yupeng Zhang, Jonathan Katz, and Charalampos Papamanthou. 2015. IntegriDB: Verifiable SQL for outsourced databases. In Proc. of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 1480--1491.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Qingji Zheng, Shouhuai Xu, and Giuseppe Ateniese. 2012. Efficient query integrity for outsourced dynamic databases. In Proceedings of the 2012 ACM Workshop on Cloud computing security workshop. 71--82.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Integrity guarantees over highly dynamic outsourced map data

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SAC '21: Proceedings of the 36th Annual ACM Symposium on Applied Computing
      March 2021
      2075 pages
      ISBN:9781450381048
      DOI:10.1145/3412841

      Copyright © 2021 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 April 2021

      Check for updates

      Qualifiers

      • poster

      Acceptance Rates

      Overall Acceptance Rate1,650of6,669submissions,25%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader