In the database outsourcing paradigm, a data owner (DO) delegates its DBMS administration to a specialized service provider (SP) that receives and processes queries from clients. The traditional outsourcing model (TOM) requires that the DO and the SP maintain authenticated data structures to enable authentication of query results. In this paper, we present SAE, a novel outsourcing model that separates authentication from query execution. Specifically, the DO does not perform any task except for maintaining its dataset (if there are updates). The SP only stores the DO's dataset and computes the query results using a conventional DBMS. All security-related tasks are outsourced to a separate trusted entity (TE), which maintains limited authentication information about the original dataset. A client contacts the TE when it wishes to establish the correctness of a result returned by the SP. The TE efficiently generates a verification token of negligible size. The client can verify the token with minimal cost. SAE eliminates the participation of the DO and the SP in the authentication process, and outperforms TOM in every aspect, including processing cost for all parties involved, communication overhead, query response time and ease of implementation in practical applications.
[1]
Ralph C. Merkle,et al.
A Certified Digital Signature
,
1989,
CRYPTO.
[2]
Feifei Li,et al.
Dynamic authenticated index structures for outsourced databases
,
2006,
SIGMOD Conference.
[3]
Michael Gertz,et al.
A General Model for Authenticated Data Structures
,
2004,
Algorithmica.
[4]
Michael Gertz,et al.
Authentic Data Publication Over the Internet
,
2003,
J. Comput. Secur..
[5]
Kian-Lee Tan,et al.
Authenticating query results in edge computing
,
2004,
Proceedings. 20th International Conference on Data Engineering.
[6]
Kian-Lee Tan,et al.
Authenticating Multi-dimensional Query Results in Data Publishing
,
2006,
DBSec.
[7]
Michael T. Goodrich,et al.
Authenticated Data Structures for Graph and Geometric Searching
,
2003,
CT-RSA.
[8]
Yin Yang,et al.
Spatial Outsourcing for Location-based Services
,
2008,
2008 IEEE 24th International Conference on Data Engineering.
[9]
Roberto Tamassia,et al.
Efficient Content Authentication over Distributed Hash Tables
,
2006
.