Correctness Authentication of Preference Top-k Query in Cloud Computing

  

  • Received:2012-07-30 Revised:2012-12-31 Published:2013-06-20

Abstract: The problem of authenticating results correctness of preference top-k query in cloud computing was proposed. On the basis of existing dominant graph, authenticated dominant graph with hash (ADG-H) and authenticated dominant graph with signature (ADG-S) were proposed. ADG-H can be used to authenticate the result correctness of snapshot query effectively. For continuous monitor, an adaptation of ADG-H can incur prohibitive network overhead, and ADG-S was proposed, by which necessary network transmission will be conducted only when the query results or verification objects are affected by data update. Extensive experiments demonstrate the effectiveness of ADG-H and ADG-S.

Key words: computer system organization, preference top-k query, verification object, dominant graph, continuous monitor

[1] DONG Jian-feng, ZHANG Yu-feng, DAI Zhi-qiang. Improved recommendation algorithm based on DPM model [J]. 吉林大学学报(工学版), 2018, 48(2): 596-604.
[2] ZHAO Bo, QIN Gui-He, ZHAO Yong-Zhe, YANG Wen-Di. Public key cryptosystem based on semi-trapdoor one-way function [J]. 吉林大学学报(工学版), 2018, 48(1): 259-267.
[3] DONG Li-yan, WANG Yue-qun, HE Jia-nan, SUN Ming-hui, LI Yong-li. Collaborative filtering recommendation algorithm based on time decay [J]. 吉林大学学报(工学版), 2017, 47(4): 1268-1272.
[4] LIU Lei, LIU Li-juan, WU Xin-wei, ZHANG Peng. Compiler testing method based on ECP metamorphic relation [J]. 吉林大学学报(工学版), 2017, 47(4): 1262-1267.
[5] YU Bin-bin, WU Xin-yu, CHU Jian-feng, HU Liang. Signature protocol for wireless sensor network based on group key agreement [J]. 吉林大学学报(工学版), 2017, 47(3): 924-929.
[6] DENG Chang-yi, GUO Rui-feng, ZHANG Yi-wen, WANG Hong-liang. Lower power dynamic scheduling algorithm for sporadic tasks based on balance factor [J]. 吉林大学学报(工学版), 2017, 47(2): 591-600.
[7] HAO Ping-ting, HU Liang, JIANG Jing-yan, CHE Xi-long. Optimistic lock protocol of multi-managed nodes [J]. 吉林大学学报(工学版), 2017, 47(1): 227-234.
[8] WEI Xiao-hui, LIU Zhi-liang, ZHUANG Yuan, LI Hong-liang, LI Xiang. Adaptive checkpoint mechanism supporting large-scale stream data processing [J]. 吉林大学学报(工学版), 2017, 47(1): 199-207.
[9] WEI Xiao-hui, LI Xiang, LI Hong-liang, LI Cong, ZHUANG Yuan, YU Hong-mei. Flexible Online MapReduce model and topology protocols supporting large-scale stream data processing [J]. 吉林大学学报(工学版), 2016, 46(4): 1222-1231.
[10] CHE Xiang-jiu, LIANG Sen. Improved algorithm of SPIHT based on Max-Heap tree [J]. 吉林大学学报(工学版), 2016, 46(3): 865-869.
[11] DONG Yue-li, GUO Quan, SUN Bin, KANG Ling. Dynamic task migration optimization for molecule docking [J]. 吉林大学学报(工学版), 2015, 45(4): 1253-1259.
[12] KUANG Zhe-jun,SHI Wei-jia,HU Liang. Residual energy algorithm of role-relationship and member-relationship based on wireless sensor network [J]. 吉林大学学报(工学版), 2015, 45(2): 600-605.
[13] ZHANG Yi-wen,GUO Rui-feng. Low-power scheduling algorithm for mixed task in real-time system [J]. 吉林大学学报(工学版), 2015, 45(1): 261-266.
[14] ZHANG Yi-wen, GUO Rui-feng. Fault-tolerant energy-saving scheduling algorithm base on checkpoint scheme [J]. 吉林大学学报(工学版), 2014, 44(4): 1112-1117.
[15] FU Shuai, MA Jian-feng, LI Hong-tao, WANG Chang-guang. Improved data aggregation algorithm based on clustered wireless sensor network [J]. 吉林大学学报(工学版), 2014, 44(4): 1118-1125.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!