Browse > Article
http://dx.doi.org/10.3837/tiis.2010.04.005

Multi-dimensional Query Authentication for On-line Stream Analytics  

Chen, Xiangrui (Dept. of Computer Science and Engineering, Inha University)
Kim, Gyoung-Bae (Dept. of Computer Education, Seowon University)
Bae, Hae-Young (Dept. of Computer Science and Engineering, Inha University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.4, no.2, 2010 , pp. 154-173 More about this Journal
Abstract
Database outsourcing is unavoidable in the near future. In the scenario of data stream outsourcing, the data owner continuously publishes the latest data and associated authentication information through a service provider. Clients may register queries to the service provider and verify the result's correctness, utilizing the additional authentication information. Research on On-line Stream Analytics (OLSA) is motivated by extending the data cube technology for higher multi-level abstraction on the low-level-abstracted data streams. Existing work on OLSA fails to consider the issue of database outsourcing, while previous work on stream authentication does not support OLSA. To close this gap and solve the problem of OLSA query authentication while outsourcing data streams, we propose MDAHRB and MDAHB, two multi-dimensional authentication approaches. They are based on the general data model for OLSA, the stream cube. First, we improve the data structure of the H-tree, which is used to store the stream cube. Then, we design and implement two authentication schemes based on the improved H-trees, the HRB- and HB-trees, in accordance with the main stream query authentication framework for database outsourcing. Along with a cost models analysis, consistent with state-of-the-art cost metrics, an experimental evaluation is performed on a real data set. It exhibits that both MDAHRB and MDAHB are feasible for authenticating OLSA queries, while MDAHRB is more scalable.
Keywords
Database outsourcing; multi-dimensional query authentication; on-line stream Analytics (OLSA); stream cube;
Citations & Related Records

Times Cited By Web Of Science : 0  (Related Records In Web of Science)
Times Cited By SCOPUS : 0
연도 인용수 순위
  • Reference
1 E. Lo, B. Kao, W. S. Ho, S. D. Lee, C. K. Chui, D. W. Cheung, "OLAP on sequence data," in Proc of. 27th Int Conf. on Management of Data, pp.649-660, 2008.
2 E. Lo, B. Kao, W. S. Ho, S. D. Lee, C. K. Chui, D. W. Cheung, "OLAP on sequence data," in Proc of. 27th Int Conf. on Management of Data, pp.649-660, 2008.
3 Y. Chen, G. Dong, J. Han, B. W. Wah, J. Wang, "Multi-dimensional regression analysis of time-series data streams," in Proc of. 28th Int Conf. on Very Large Data Bases (VLDB), pp.323-334, 2002.
4 Y. D. Cai, D. Clutter, G. Pape, J. Han, M. Welge, L. Auvil, "MAIDS: Mining alarming incidents from data streams," in Proc of. 23 th Int ACM SIGMOD Conf. on Management of Data, pp.919-920, 2004.
5 M. Cho, J. Pei, K. Wang, "Answering ad hoc aggregate queries from data streams using prefix aggregate trees," Knowl. Inf. Syst., vol.12, no.3, pp.301-329, 2007.   DOI   ScienceOn
6 S. Nath, H. Yu, H. Chan, "Secure outsourced aggregation via one-way chains," in Proc of. 28 th Int ACM SIGMOD Conf. on Management of Data, pp.31-44, 2009.
7 "Fips pub 180-1: Secure hash standard," National Institute of Standards and Technology, 1995.
8 R. Merkle, "A certified digital signature," in Proc of. 9th Int Conf. on Advances in Cryptology (CRYPTO), pp.218-238, 1989.
9 Y. Yang, S. Papadopoulos, D. Papadias, G. Kollios, "Authenticated indexing for outsourced spatial databases," International Journal on Very Large Databases, vol.18, no.3, pp.631-648, 2009.   DOI   ScienceOn
10 F. Li, K. Yi, M. Hadjieleftheriou, G. Kollios, "Proof-infused streams: Enabling authentication of sliding window queries on streams," in Proc of. 33th Int Conf. on Very Large Data Bases (VLDB), pp.147-158, 2007.
11 Y. Yang, D. Papadias, S. Papadopoulos, P. Kalnis, "Authenticated join processing in outsourced databases," in Proc of. 28th Int Conf. on Management of Data, pp.5-18, 2009.
12 H. Gonzalez, J. Han, X. Li, "Flowcube: Constructuing RFID flowcubes for multi-dimensional analysis of commodity flows," in Proc of. 32th Int Conf. on Very Large Data Bases (VLDB), pp.834-845, 2006.
13 S. Papadopoulos, Y. Yang, D. Papadias, "CADS: Continuous authentication on data streams," in Proc. of 33th Int Conf. on Very Large Data Bases (VLDB), pp.135-146, 2007.
14 E. F. Codd, S. B. Codd, C. T. Salley, "Providing OLAP (On-line Analytical Processing) to User-Analysts: An IT Mandate," Codd and Date. Inc, 1993.
15 C. S. Inc., "NGSIM: Next generation simulation," http://ngsim.camsys.com, 2005.
16 J. Han, Y. Chen, G. Dong, J. Pei, B. W. Wah, J. Wang, Y. D. Cai, "Stream cube: An architecture for multi-dimensional analysis of data streams," Distributed and Parallel Databases, vol.18, no.2, pp.173-197, 2005.   DOI   ScienceOn
17 M. J. Franklin, "From moore to metcalf: The network as the next database platform," in Proc. of 26th Int Workshop on Management of Data, 2007.
18 W. Mao, "Modern Cryptography: Theory and Practice," Pearson Education, 2003.
19 F. Li, M. Hadjieleftheriou, G. Kollios, L. Reyzin, "Dynamic authenticated index structures for outsourced databases," in Proc of. 25th Int Conf. on Management of Data, pp.121-132, 2006.
20 Crypto++ library. http://www.eskimo.com/weidai/benchmark.html
21 Openssl. http://www.openssl.org.
22 H. Hacigumus, B. Iyer, S. Mehrotra, "Providing database as a service," in Proc. of 18th Int Conf.on Data Engineering (ICDE), IEEE Computer Society, pp.29-38, 2002.