Towards Efficient Authenticated Subgraph Query Service in Outsourced Graph Databases

Graphs are powerful tools suitable for a large variety of applications including chemical databases and the Semantic Web, among others. A fundamental query of graph databases is the subgraph query: given a query graph q, it retrieves the data graphs from a database that contain q. Due to the cost of managing massive data coupled with the computational hardness of subgraph query processing, outsourcing the processing to a third-party service provider is an appealing alternative. However, security properties such as data integrity and the response time are critical Quality of Service (QoS) issues in query services. Unfortunately, to our knowledge, authenticated subgraph query services have not been addressed before. To support the service, we propose Merkle IFTree (MIFTree) where Merkle hash trees are applied into our Intersection-aware Feature-subgraph Tree (IFTree). IFTree aims to minimize I/O in a well-received subgraph query paradigm called the filtering-and-verification framework. The structures that need to be introduced to verification objects ( VOs) and the authentication time are both minimized. Subsequently, the overall response time is minimized. For optimizations, we propose an enhanced authentication method on MIFTree. Our detailed experiments on both real and synthetic datasets demonstrate that MIFTree is clearly more efficient than a baseline method.

[1]  Feifei Li,et al.  Small synopses for group-by query verification on outsourced data streams , 2009, TODS.

[2]  Feifei Li,et al.  Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.

[3]  Kyriakos Mouratidis,et al.  Authenticating the query results of text search engines , 2008, Proc. VLDB Endow..

[4]  Prasenjit Mitra,et al.  Lindex: a lattice-based index for graph databases , 2012, The VLDB Journal.

[5]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[6]  Jianzhong Li,et al.  Hash-base subgraph query processing method for graph-structured XML documents , 2008, Proc. VLDB Endow..

[7]  Kian-Lee Tan,et al.  Query Answer Authentication , 2012, Synthesis Lectures on Data Management.

[8]  Elisa Bertino,et al.  How to authenticate graphs without leaking , 2010, EDBT '10.

[9]  Dolwichit Jannarm Dolwichit Jannarm การจัดการ IT Outsourcing , 2014 .

[10]  Karsten Klein,et al.  CT-index: Fingerprint-based graph indexing combining cycles and trees , 2011, 2011 IEEE 27th International Conference on Data Engineering.

[11]  Jeffrey Xu Yu,et al.  Taming verification hardness: an efficient algorithm for testing subgraph isomorphism , 2008, Proc. VLDB Endow..

[12]  TanKian-Lee,et al.  Query assurance verification for outsourced multi-dimensional databases , 2009 .

[13]  Elisa Bertino,et al.  Leakage-free redactable signatures , 2012, CODASPY '12.

[14]  Jiawei Han,et al.  gSpan: graph-based substructure pattern mining , 2002, 2002 IEEE International Conference on Data Mining, 2002. Proceedings..

[15]  Joachim Posegga,et al.  On Structural Signatures for Tree Data Structures , 2012, ACNS.

[16]  Ambuj K. Singh,et al.  Closure-Tree: An Index Structure for Graph Queries , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[17]  Jeffrey Xu Yu,et al.  iGraph: A Framework for Comparisons of Disk-Based Graph Indexing Techniques , 2010, Proc. VLDB Endow..

[18]  Michael Y. Galperin,et al.  The 2012 Nucleic Acids Research Database Issue and the online Molecular Biology Database Collection , 2011, Nucleic Acids Res..

[19]  Elisa Bertino,et al.  Structural signatures for tree data structures , 2008, Proc. VLDB Endow..

[20]  Philip S. Yu,et al.  Graph indexing: a frequent structure-based approach , 2004, SIGMOD '04.

[21]  Daniel A. Menascé,et al.  QoS Issues in Web Services , 2002, IEEE Internet Comput..

[22]  Wei Wang,et al.  Efficient mining of frequent subgraphs in the presence of isomorphism , 2003, Third IEEE International Conference on Data Mining.

[23]  Yin Yang,et al.  Spatial Outsourcing for Location-based Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[24]  Elisa Bertino,et al.  Efficient Leakage-free Authentication of Trees, Graphs and Forests , 2012, IACR Cryptol. ePrint Arch..

[25]  Wilfred Ng,et al.  Fg-index: towards verification-free query processing on graph databases , 2007, SIGMOD '07.

[26]  Michael Gertz,et al.  Flexible authentication of XML documents , 2001, CCS '01.

[27]  Kian-Lee Tan,et al.  Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.

[28]  PangHweeHwa,et al.  Authenticating the query results of text search engines , 2008, VLDB 2008.

[29]  Dennis Shasha,et al.  Algorithmics and applications of tree and graph searching , 2002, PODS.

[30]  Kian-Lee Tan,et al.  Query assurance verification for outsourced multi-dimensional databases , 2009, J. Comput. Secur..

[31]  Michael Gertz,et al.  A General Model for Authenticated Data Structures , 2004, Algorithmica.

[32]  Yin Yang,et al.  Continuous authentication on relational streams , 2009, The VLDB Journal.

[33]  Lei Zou,et al.  A novel spectral coding in a large graph database , 2008, EDBT '08.

[34]  Kyriakos Mouratidis,et al.  Efficient verification of shortest path search via authenticated hints , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).