DOI QR코드

DOI QR Code

Multi-dimensional Query Authentication for On-line Stream Analytics

  • Received : 2010.01.28
  • Accepted : 2010.04.15
  • Published : 2010.04.29

Abstract

Database outsourcing is unavoidable in the near future. In the scenario of data stream outsourcing, the data owner continuously publishes the latest data and associated authentication information through a service provider. Clients may register queries to the service provider and verify the result's correctness, utilizing the additional authentication information. Research on On-line Stream Analytics (OLSA) is motivated by extending the data cube technology for higher multi-level abstraction on the low-level-abstracted data streams. Existing work on OLSA fails to consider the issue of database outsourcing, while previous work on stream authentication does not support OLSA. To close this gap and solve the problem of OLSA query authentication while outsourcing data streams, we propose MDAHRB and MDAHB, two multi-dimensional authentication approaches. They are based on the general data model for OLSA, the stream cube. First, we improve the data structure of the H-tree, which is used to store the stream cube. Then, we design and implement two authentication schemes based on the improved H-trees, the HRB- and HB-trees, in accordance with the main stream query authentication framework for database outsourcing. Along with a cost models analysis, consistent with state-of-the-art cost metrics, an experimental evaluation is performed on a real data set. It exhibits that both MDAHRB and MDAHB are feasible for authenticating OLSA queries, while MDAHRB is more scalable.

Keywords

References

  1. H. Hacigumus, B. Iyer, S. Mehrotra, "Providing database as a service," in Proc. of 18th Int Conf.on Data Engineering (ICDE), IEEE Computer Society, pp.29-38, 2002.
  2. S. Papadopoulos, Y. Yang, D. Papadias, "CADS: Continuous authentication on data streams," in Proc. of 33th Int Conf. on Very Large Data Bases (VLDB), pp.135-146, 2007.
  3. C. S. Inc., "NGSIM: Next generation simulation," http://ngsim.camsys.com, 2005.
  4. J. Han, Y. Chen, G. Dong, J. Pei, B. W. Wah, J. Wang, Y. D. Cai, "Stream cube: An architecture for multi-dimensional analysis of data streams," Distributed and Parallel Databases, vol.18, no.2, pp.173-197, 2005. https://doi.org/10.1007/s10619-005-3296-1
  5. M. J. Franklin, "From moore to metcalf: The network as the next database platform," in Proc. of 26th Int Workshop on Management of Data, 2007.
  6. E. F. Codd, S. B. Codd, C. T. Salley, "Providing OLAP (On-line Analytical Processing) to User-Analysts: An IT Mandate," Codd and Date. Inc, 1993.
  7. W. Mao, "Modern Cryptography: Theory and Practice," Pearson Education, 2003.
  8. F. Li, M. Hadjieleftheriou, G. Kollios, L. Reyzin, "Dynamic authenticated index structures for outsourced databases," in Proc of. 25th Int Conf. on Management of Data, pp.121-132, 2006.
  9. Crypto++ library. http://www.eskimo.com/weidai/benchmark.html
  10. Openssl. http://www.openssl.org.
  11. "Fips pub 180-1: Secure hash standard," National Institute of Standards and Technology, 1995.
  12. R. Merkle, "A certified digital signature," in Proc of. 9th Int Conf. on Advances in Cryptology (CRYPTO), pp.218-238, 1989.
  13. F. Li, K. Yi, M. Hadjieleftheriou, G. Kollios, "Proof-infused streams: Enabling authentication of sliding window queries on streams," in Proc of. 33th Int Conf. on Very Large Data Bases (VLDB), pp.147-158, 2007.
  14. Y. Yang, S. Papadopoulos, D. Papadias, G. Kollios, "Authenticated indexing for outsourced spatial databases," International Journal on Very Large Databases, vol.18, no.3, pp.631-648, 2009. https://doi.org/10.1007/s00778-008-0113-2
  15. Y. Yang, D. Papadias, S. Papadopoulos, P. Kalnis, "Authenticated join processing in outsourced databases," in Proc of. 28th Int Conf. on Management of Data, pp.5-18, 2009.
  16. H. Gonzalez, J. Han, X. Li, "Flowcube: Constructuing RFID flowcubes for multi-dimensional analysis of commodity flows," in Proc of. 32th Int Conf. on Very Large Data Bases (VLDB), pp.834-845, 2006.
  17. E. Lo, B. Kao, W. S. Ho, S. D. Lee, C. K. Chui, D. W. Cheung, "OLAP on sequence data," in Proc of. 27th Int Conf. on Management of Data, pp.649-660, 2008.
  18. E. Lo, B. Kao, W. S. Ho, S. D. Lee, C. K. Chui, D. W. Cheung, "OLAP on sequence data," in Proc of. 27th Int Conf. on Management of Data, pp.649-660, 2008.
  19. Y. Chen, G. Dong, J. Han, B. W. Wah, J. Wang, "Multi-dimensional regression analysis of time-series data streams," in Proc of. 28th Int Conf. on Very Large Data Bases (VLDB), pp.323-334, 2002.
  20. Y. D. Cai, D. Clutter, G. Pape, J. Han, M. Welge, L. Auvil, "MAIDS: Mining alarming incidents from data streams," in Proc of. 23 th Int ACM SIGMOD Conf. on Management of Data, pp.919-920, 2004.
  21. M. Cho, J. Pei, K. Wang, "Answering ad hoc aggregate queries from data streams using prefix aggregate trees," Knowl. Inf. Syst., vol.12, no.3, pp.301-329, 2007. https://doi.org/10.1007/s10115-006-0024-8
  22. S. Nath, H. Yu, H. Chan, "Secure outsourced aggregation via one-way chains," in Proc of. 28 th Int ACM SIGMOD Conf. on Management of Data, pp.31-44, 2009.