Authentication of Multi-Dimensional Top-$K$ Query on Untrusted Server

Consider a database where each record has multiple attributes. An untrusted server is in charge of processing queries over this database, and we want to provide a mechanism for users to verify the correctness of their query results. Here each query, referred to as a multi-dimensional top-$k$ query, retrieves $k$ records whose output with user-supplied ranking function is among top $k$. Multi-dimensional top-$k$ query is widely used in real applications. However, as the traditional query authentication methods cannot be directly deployed on multi-dimensional top-$k$ query, it is still a challenging problem to authenticate the multi-dimensional top-$k$ query results. In this paper, we propose an authentication solution to support multi-dimensional top-$k$ query based on signature chain. By using signature chain for each record and its successors on each dimension, our solution allows users to efficiently verify the soundness and completeness of multi-dimensional top-$k$ query results. Through theoretical analysis and simulation, we demonstrate the effectiveness of our proposed solution.

[1]  Jie Wu,et al.  Secure and Efficient Multi-Attribute Range Queries based on Comparable Inner Product Encoding , 2018, 2018 IEEE Conference on Communications and Network Security (CNS).

[2]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[3]  Kim-Kwang Raymond Choo,et al.  Enhancing privacy through uniform grid and caching in location-based services , 2017, Future Gener. Comput. Syst..

[4]  Richard Mayeux,et al.  A summary risk score for the prediction of Alzheimer disease in elderly persons. , 2010, Archives of neurology.

[5]  Michael Gertz,et al.  Authentic Data Publication Over the Internet , 2003, J. Comput. Secur..

[6]  Jie Wu,et al.  Progressive or Conservative: Rationally Allocate Cooperative Work in Mobile Social Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[7]  Xiang Cheng,et al.  Authentication of Top-k Spatial Keyword Queries in Outsourced Databases , 2015, DASFAA.

[8]  Jie Wu,et al.  Achieving reliable and secure services in cloud computing environments , 2017, Comput. Electr. Eng..

[9]  Kian-Lee Tan,et al.  Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.

[10]  Jie Wu,et al.  Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks , 2017, IEEE Transactions on Parallel and Distributed Systems.

[11]  Yuzhe Tang,et al.  Outsourcing multi-version key-value stores with verifiable data freshness , 2014, 2014 IEEE 30th International Conference on Data Engineering.

[12]  Ying Cai,et al.  Authentication of function queries , 2016, 2016 IEEE 32nd International Conference on Data Engineering (ICDE).

[13]  Jie Wu,et al.  Coverage and distinguishability requirements for Traffic Flow Monitoring Systems , 2016, 2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS).

[14]  Yin Yang,et al.  Authenticated indexing for outsourced spatial databases , 2009, The VLDB Journal.