Javascript must be enabled to continue!
Authenticating multi‐dimensional query results in outsourced database
View through CrossRef
In the outsourced database model, the third‐party server provides query services to users on behalf of the data owner. However, the service provider may be unreliable or susceptible to attacks. The service provider can also produce inauthentic or incomplete query results. An authentication scheme for multi‐dimensional data is proposed in the present study to investigate this problem. The authors introduce a new concept of tower head node based on the
k
‐dimensional skip list and use it to construct a new authenticated data structure. This structure supports both multi‐dimensional range query and dynamic maintenance. They also show how to verify the authenticity and completeness of query results on multi‐dimensional datasets in the outsourced database model. Moreover, this structure can be fully outsourced, thus the service provider can perform the entire maintenance, which is crucial for users with limited computational resources. The proof of security and the evaluation of experiment demonstrate that the scheme is secure and outperforms previous schemes in terms of the construction cost, proof size, query time, verification time and update cost.
Institution of Engineering and Technology (IET)
Title: Authenticating multi‐dimensional query results in outsourced database
Description:
In the outsourced database model, the third‐party server provides query services to users on behalf of the data owner.
However, the service provider may be unreliable or susceptible to attacks.
The service provider can also produce inauthentic or incomplete query results.
An authentication scheme for multi‐dimensional data is proposed in the present study to investigate this problem.
The authors introduce a new concept of tower head node based on the
k
‐dimensional skip list and use it to construct a new authenticated data structure.
This structure supports both multi‐dimensional range query and dynamic maintenance.
They also show how to verify the authenticity and completeness of query results on multi‐dimensional datasets in the outsourced database model.
Moreover, this structure can be fully outsourced, thus the service provider can perform the entire maintenance, which is crucial for users with limited computational resources.
The proof of security and the evaluation of experiment demonstrate that the scheme is secure and outperforms previous schemes in terms of the construction cost, proof size, query time, verification time and update cost.
Related Results
Query expansion by relying on the structure of knowledge bases
Query expansion by relying on the structure of knowledge bases
Query expansion techniques aim at improving the results achieved by a user's query by means of introducing new expansion terms, called expansion features. Expansion features introd...
A Survey of Query Auto Completion in Information Retrieval
A Survey of Query Auto Completion in Information Retrieval
In information retrieval, query auto completion (QAC), also known as type-ahead [Xiao et al., 2013, Cai et al., 2014b] and auto-complete suggestion [Jain and Mishne, 2010], refers ...
The bargaining position of outsourced labours in the ASEAN Economic Community (AEC) era
The bargaining position of outsourced labours in the ASEAN Economic Community (AEC) era
This study was motivated by the increasing number of foreign manpower entering and working in Indonesia since the implementation of the ASEAN Economic Community (AEC) by the end of...
Named Entity Recognition in Statistical Dataset Search Queries
Named Entity Recognition in Statistical Dataset Search Queries
Search engines must understand user queries to provide relevant search results. Search engines can enhance their understanding of user intent by employing named entity recognition ...
RaPID-Query for Fast Identity by Descent Search and Genealogical Analysis
RaPID-Query for Fast Identity by Descent Search and Genealogical Analysis
Abstract
The size of genetic databases has grown large enough such that, genetic genealogical search, a process of inferring familial relatedness by identifying DNA...
Tuning Database Pada Sistem Penerimaan Mahasiswa Baru Menggunakan Optimasi Query dan Indexing
Tuning Database Pada Sistem Penerimaan Mahasiswa Baru Menggunakan Optimasi Query dan Indexing
Dalam pengoperasian database MaraiaDB diperlukan aplikasi berupa server localhost yang memiliki response waktu untuk menjalankan sebuah query agar dapat mendapatkan waktu yang efis...
Some new fuzzy query processing methods based on similarity measurement and fuzzy data clustering
Some new fuzzy query processing methods based on similarity measurement and fuzzy data clustering
In relational and object-oriented database systems there is always data that is naturally fuzzy or uncertain. However, to deal with complex data types with fuzzy nature, these syst...
Techniques for Improving Web Search by Understanding Queries
Techniques for Improving Web Search by Understanding Queries
<p>This thesis investigates the refinement of web search results with a special focus on the use of clustering and the role of queries. It presents a collection of new method...

