• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Min, Hong Cheng, and Chen Chi. Server Transparent Query Authentication of Outsourced Database[J]. Journal of Computer Research and Development, 2010, 47(1): 182-190.
Citation: Zhang Min, Hong Cheng, and Chen Chi. Server Transparent Query Authentication of Outsourced Database[J]. Journal of Computer Research and Development, 2010, 47(1): 182-190.

Server Transparent Query Authentication of Outsourced Database

More Information
  • Published Date: January 14, 2010
  • With the rapid growth of database outsourcing, the security concerns in the outsourced database (ODB) paradigm are receiving more and more attentions. Query authentication is one of the important security requirements which enable the database clients to verify the authenticity and the completeness of the query results. Currently several query verification schemes are proposed based on the specially designed authentication data structures (ADS), in which the DBMS computes verification object (VO) for each query, and returns the result together with its VO. Since this “server-centric” model requires the functional extensions of DBMS and the modification of communication protocols, it will inevitably affect the application in practice. In this paper the authors propose a server transparent query authentication method called chain embedded signature (CES), which embeds the VO inside the ODB, therefore it supports the query authentication with commercial DBMS and standard SQL commands. This transparency also frees the server from heavy verification tasks, and prevents it from becoming the bottleneck of performance. Furthermore, since the VOs are stored inside ODB, the consistency of them is promised by the database transaction mechanism. The cost analysis and experimental results show that the time and space overhead are reasonable to be deployed in real systems.
  • Related Articles

    [1]Wang Jieting, Qian Yuhua, Li Feijiang, Liu Guoqing. Support Vector Machine with Eliminating the Random Consistency[J]. Journal of Computer Research and Development, 2020, 57(8): 1581-1593. DOI: 10.7544/issn1000-1239.2020.20200127
    [2]Feng Chang, Liao Shizhong. Model Selection for Gaussian Kernel Support Vector Machines in Random Fourier Feature Space[J]. Journal of Computer Research and Development, 2016, 53(9): 1971-1978. DOI: 10.7544/issn1000-1239.2016.20150489
    [3]Hua Xiaopeng, Ding Shifei. Locality Preserving Twin Support Vector Machines[J]. Journal of Computer Research and Development, 2014, 51(3): 590-597.
    [4]Guo Husheng, Wang Wenjian. A Support Vector Machine Learning Method Based on Granule Shift Parameter[J]. Journal of Computer Research and Development, 2013, 50(11): 2315-2324.
    [5]Ding Lizhong and Liao Shizhong. Approximate Model Selection on Regularization Path for Support Vector Machines[J]. Journal of Computer Research and Development, 2012, 49(6): 1248-1255.
    [6]Xu Peng, Liu Qiong, and Lin Sen. Internet Traffic Classification Using Support Vector Machine[J]. Journal of Computer Research and Development, 2009, 46(3): 407-414.
    [7]Xiong Jinzhi, Yuan Huaqiang, Peng Hong. A General Formulation of Polynomial Smooth Support Vector Machines[J]. Journal of Computer Research and Development, 2008, 45(8): 1346-1353.
    [8]Li Yingxin and Ruan Xiaogang. Feature Selection for Cancer Classification Based on Support Vector Machine[J]. Journal of Computer Research and Development, 2005, 42(10): 1796-1801.
    [9]Liu Xiangdong, Luo Bin, and Chen Zhaoqian. Optimal Model Selection for Support Vector Machines[J]. Journal of Computer Research and Development, 2005, 42(4): 576-581.
    [10]Wu Gaowei, Tao Qing, Wang Jue. Support Vector Machines Based on Posteriori Probability[J]. Journal of Computer Research and Development, 2005, 42(2): 196-202.

Catalog

    Article views (752) PDF downloads (621) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return