Please use this identifier to cite or link to this item: https://scholarbank.nus.edu.sg/handle/10635/25047
DC FieldValue
dc.titleQuery Authentication and processing on outsourced databases
dc.contributor.authorCHENG WEIWEI
dc.date.accessioned2011-07-31T18:00:22Z
dc.date.available2011-07-31T18:00:22Z
dc.date.issued2011-01-28
dc.identifier.citationCHENG WEIWEI (2011-01-28). Query Authentication and processing on outsourced databases. ScholarBank@NUS Repository.
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/25047
dc.description.abstractIn Outsourced Database model, data owners publish their data management requests through a number of remote, un-trusted external service providers. Service providers host owners? databases and offer seamless mechanisms to create, store, update and access (query) their databases. This model introduces several research issues related to data security. In this thesis, we introduce a mechanism for users to verify that their query answers on a multi-dimensional dataset are correct, in the sense of being complete and authentic. Two instantiations of the approach are studied :( 1) Verifiable KD-tree (VKDtree) that is based on space partitioning, and (2)Verifiable R-tree (VR-tree) that is based on data partitioning. The schemes are evaluated on window queries, and results show that VR-tree is highly precise, meaning that few data points outside of a query result are disclosed in the course of proving its correctness. Moreover, as an extension of the VR-tree, we proposed a mechanism that extend the signature-based mechanism for users to verify that their answers for k nearest neighbors queries on a multidimensional dataset are complete (i.e. no qualifying data points are omitted), authentic (i.e. no answer points are tampered) and minimal (i.e., no non-answer points are returned in the plain). Essentially, our scheme returns k answer points in the plain, and a set of (~p; q)-pairs of points, where ~p is the digest of a non-answer point p in the dataset to facilitate the signature chaining mechanism to verify the authenticity of the answer points, and q is a reference point (not in the dataset) used to verify that p is indeed further away from the kth nearest point. We study two instantiations of the approach ? one based on the native data space using space partitioning method (a.k.a. R-tree) and the other based on the metric space using iDistance. We conducted an experimental study, and report our findings here.
dc.language.isoen
dc.subjectmulti-dimensional, outsourced database, knn, signature chain, R-tree,i-distance
dc.typeThesis
dc.contributor.departmentCOMPUTER SCIENCE
dc.contributor.supervisorTAN KIAN LEE
dc.description.degreeMaster's
dc.description.degreeconferredMASTER OF SCIENCE
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Master's Theses (Open)

Show simple item record
Files in This Item:
File Description SizeFormatAccess SettingsVersion 
ChengWW.pdf314.42 kBAdobe PDF

OPEN

NoneView/Download

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.