吉林大学学报(工学版) ›› 2014, Vol. 44 ›› Issue (01): 164-170.doi: 10.13229/j.cnki.jdxbgxb201401028

• paper • Previous Articles     Next Articles

Correctness authentication of preference top-k query in cloud computing

SHENG Gang1, WEN Tao1, GUO Quan2, YIN Ying3   

  1. 1. Software Center, Northeastern University, Shenyang 110819, China;
    2. Liaoning Key Lab of Network Security and Computing Technology, Neusoft Information Institute, Dalian 116023, China;
    3. College of Information Science and Engineering, Northeastern University, Shenyang 110819, China
  • Received:2012-07-30 Online:2014-01-01 Published:2014-01-01

Abstract:

The problem of correctness of authenticating results of preference top-k query in cloud computing is investigated. On the basis of existing dominant graph, Authenticated Dominant Graph with Hash (ADG-H) and Authenticated Dominant Graph with Signature (ADG-S) are proposed. ADG-H can be used to authenticate the result correctness of snapshot query effectively. For continuous monitor, an adoptation of ADG-H can incur prohibitive network overhead, so ADG-S was proposed, by which necessary network transmission can be conducted only when the query results or verification objects are affected by data update. Extensive experiments demonstrate the effectiveness of the proposed ADG-H and ADG-S.

Key words: computer application, preference top-k query, verification object, dominant graph, continuous monitor

CLC Number: 

  • TP309.2

[1] Ilyas Ihab F, Beskales George, Soliman Mohamed A. A survey of top-k query processing techniques in relational database systems[J]. ACM Computing Surveys, 2008, 40(4):1-58.

[2] Chang Yuan-chi, Lawrence Bergman, Vittorio Castelli, et al. The onion technique: indexing for linear optimization queries[C]//Proc of the 2000 ACM SIGMOD, New York: ACM, 2000:391-402.

[3] Hristidis Vagelis, Koudas Nick, Papakonstantinou Yannis. Prefer:a system for the efficient execution of multi-parametric ranked queries[C]//Proc of the 2001 ACM SIGMOD, New York: ACM, 2001: 259-270.

[4] Zou Lei, Chen Lei. Dominant graph: an efficient indexing structure to answer top-k queries[C]//Proc of the 24th ICDE, Washington: IEEE Computer Society, 2008:536-545.

[5] Hacigumus H, Iyer B R, Mehrotra S. Providing database as a service[C]//Proc of the 18th ICDE. Washingtong: IEEE Computer Society, 2002: 29-40.

[6] Merkle R. A certified digital signature[C]//Advance in Cryptology-Crypto'89, Berlin: Springer, LNCS 435, 1990: 218-238.

[7] Premkumar Devanbu, Michael Gertz, Charles Martel, et al. Authentic data publication over the internet[J]. Journal of Computer Security, 2003, 11(3):291-314.

[8] Xie Min, Wang Hai-xun, Yin Jian, et al. Integrity auditing of outsourced data[C]//Proc of the 33rd VLDB, New York: ACM, 2007: 782-793.

[9] 张敏, 洪澄, 陈驰. 一种服务器透明的外包数据库查询验证方案[J]. 计算机研究与发展, 2010, 47(1):182-190. Zhang Min, Hong Cheng, Chen Chi. Server transparent query authentication of outsourced database[J]. Journal of Computer Research and Development, 2010, 47(1):182-190.

[10] 咸鹤群, 冯登国. 外包数据库模型中的完整性检测方案[J].计算机研究与发展, 2010, 47(6):1107-1115. Xian He-qun, Feng Deng-guo. An integrity checking scheme in outsourced database model[J]. Journal of Computer Research and Development, 2010, 47(6):1107-1115.

[11] 温涛, 盛刚, 郭权, 等. 追加型数据库外包中的查询结果验证[J]. 计算机研究与发展, 2012, 49(10):2077-2085. Wen Tao, Sheng Gang, Guo Quan, et al. Query results authentication of outsourced append-only databases[J]. Journal of Computer Research and Development, 2012, 49(10): 2077-2085.

[12] Yang Yin, Stavros Papadopoulos, Dimitris Papadias, et al. Authenticated indexing for outsourced spatial databases[J]. The VLDB Journal, 2009, 18(3):631-648.

[13] Stavros Papadopoulos, Wang Li-xing, Yang Yin, et al. Authenticated multi-step nearest neighbor search[J]. IEEE Transactions on Knowledge and Data Engineering, 2011, 23(5): 641-654.

[14] Stavros Papadopoulos, Yang Yin, Dimitris Papadias. Continuous authentication on relational streams[J]. The VLDB Journal, 2010, 19(2): 161-180.

[1] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[2] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[3] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[4] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[5] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[6] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[7] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[8] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[9] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[10] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[11] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[12] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[13] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[14] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
[15] HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!