Authenticated join processing in outsourced databases

Yin Yang, Dimitris Papadias, Stavros Papadopoulos, Panos Kalnis

Research output: Chapter in Book/Report/Conference proceedingConference contribution

70 Citations (Scopus)

Abstract

Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner's signature. Previous authentication techniques deal with range queries on a single relation using an authenticated data structure (ADS). On the other hand, authenticated join processing is inherently more complex than ranges since only the base relations (but not their combination) are signed by the owner. In this paper, we present three novel join algorithms depending on the ADS availability: (i) Authenticated Indexed Sort Merge Join (AISM), which utilizes a single ADS on the join attribute, (ii) Authenticated Index Merge Join (AIM) that requires an ADS (on the join attribute) for both relations, and (iii) Authenticated Sort Merge Join (ASM), which does not rely on any ADS. We experimentally demonstrate that the proposed methods outperform two benchmark algorithms, often by several orders of magnitude, on all performance metrics, and effectively shift the workload to the outsourcing service. Finally, we extend our techniques to complex queries that combine multi-way joins with selections and projections.

Original languageEnglish
Title of host publicationSIGMOD-PODS'09 - Proceedings of the International Conference on Management of Data and 28th Symposium on Principles of Database Systems
Pages5-17
Number of pages13
DOIs
Publication statusPublished - 2009
Externally publishedYes
EventInternational Conference on Management of Data and 28th Symposium on Principles of Database Systems, SIGMOD-PODS'09 - Providence, RI, United States
Duration: 29 Jun 20092 Jul 2009

Other

OtherInternational Conference on Management of Data and 28th Symposium on Principles of Database Systems, SIGMOD-PODS'09
CountryUnited States
CityProvidence, RI
Period29/6/092/7/09

Fingerprint

Data structures
Processing
Outsourcing
Authentication
Servers
Availability

Keywords

  • Database outsourcing
  • Join algorithms
  • Query authentication

ASJC Scopus subject areas

  • Software

Cite this

Yang, Y., Papadias, D., Papadopoulos, S., & Kalnis, P. (2009). Authenticated join processing in outsourced databases. In SIGMOD-PODS'09 - Proceedings of the International Conference on Management of Data and 28th Symposium on Principles of Database Systems (pp. 5-17) https://doi.org/10.1145/1559845.1559849

Authenticated join processing in outsourced databases. / Yang, Yin; Papadias, Dimitris; Papadopoulos, Stavros; Kalnis, Panos.

SIGMOD-PODS'09 - Proceedings of the International Conference on Management of Data and 28th Symposium on Principles of Database Systems. 2009. p. 5-17.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Yang, Y, Papadias, D, Papadopoulos, S & Kalnis, P 2009, Authenticated join processing in outsourced databases. in SIGMOD-PODS'09 - Proceedings of the International Conference on Management of Data and 28th Symposium on Principles of Database Systems. pp. 5-17, International Conference on Management of Data and 28th Symposium on Principles of Database Systems, SIGMOD-PODS'09, Providence, RI, United States, 29/6/09. https://doi.org/10.1145/1559845.1559849
Yang Y, Papadias D, Papadopoulos S, Kalnis P. Authenticated join processing in outsourced databases. In SIGMOD-PODS'09 - Proceedings of the International Conference on Management of Data and 28th Symposium on Principles of Database Systems. 2009. p. 5-17 https://doi.org/10.1145/1559845.1559849
Yang, Yin ; Papadias, Dimitris ; Papadopoulos, Stavros ; Kalnis, Panos. / Authenticated join processing in outsourced databases. SIGMOD-PODS'09 - Proceedings of the International Conference on Management of Data and 28th Symposium on Principles of Database Systems. 2009. pp. 5-17
@inproceedings{1221962c3be7433aa2f1df02bbfa86e2,
title = "Authenticated join processing in outsourced databases",
abstract = "Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner's signature. Previous authentication techniques deal with range queries on a single relation using an authenticated data structure (ADS). On the other hand, authenticated join processing is inherently more complex than ranges since only the base relations (but not their combination) are signed by the owner. In this paper, we present three novel join algorithms depending on the ADS availability: (i) Authenticated Indexed Sort Merge Join (AISM), which utilizes a single ADS on the join attribute, (ii) Authenticated Index Merge Join (AIM) that requires an ADS (on the join attribute) for both relations, and (iii) Authenticated Sort Merge Join (ASM), which does not rely on any ADS. We experimentally demonstrate that the proposed methods outperform two benchmark algorithms, often by several orders of magnitude, on all performance metrics, and effectively shift the workload to the outsourcing service. Finally, we extend our techniques to complex queries that combine multi-way joins with selections and projections.",
keywords = "Database outsourcing, Join algorithms, Query authentication",
author = "Yin Yang and Dimitris Papadias and Stavros Papadopoulos and Panos Kalnis",
year = "2009",
doi = "10.1145/1559845.1559849",
language = "English",
isbn = "9781605585543",
pages = "5--17",
booktitle = "SIGMOD-PODS'09 - Proceedings of the International Conference on Management of Data and 28th Symposium on Principles of Database Systems",

}

TY - GEN

T1 - Authenticated join processing in outsourced databases

AU - Yang, Yin

AU - Papadias, Dimitris

AU - Papadopoulos, Stavros

AU - Kalnis, Panos

PY - 2009

Y1 - 2009

N2 - Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner's signature. Previous authentication techniques deal with range queries on a single relation using an authenticated data structure (ADS). On the other hand, authenticated join processing is inherently more complex than ranges since only the base relations (but not their combination) are signed by the owner. In this paper, we present three novel join algorithms depending on the ADS availability: (i) Authenticated Indexed Sort Merge Join (AISM), which utilizes a single ADS on the join attribute, (ii) Authenticated Index Merge Join (AIM) that requires an ADS (on the join attribute) for both relations, and (iii) Authenticated Sort Merge Join (ASM), which does not rely on any ADS. We experimentally demonstrate that the proposed methods outperform two benchmark algorithms, often by several orders of magnitude, on all performance metrics, and effectively shift the workload to the outsourcing service. Finally, we extend our techniques to complex queries that combine multi-way joins with selections and projections.

AB - Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner's signature. Previous authentication techniques deal with range queries on a single relation using an authenticated data structure (ADS). On the other hand, authenticated join processing is inherently more complex than ranges since only the base relations (but not their combination) are signed by the owner. In this paper, we present three novel join algorithms depending on the ADS availability: (i) Authenticated Indexed Sort Merge Join (AISM), which utilizes a single ADS on the join attribute, (ii) Authenticated Index Merge Join (AIM) that requires an ADS (on the join attribute) for both relations, and (iii) Authenticated Sort Merge Join (ASM), which does not rely on any ADS. We experimentally demonstrate that the proposed methods outperform two benchmark algorithms, often by several orders of magnitude, on all performance metrics, and effectively shift the workload to the outsourcing service. Finally, we extend our techniques to complex queries that combine multi-way joins with selections and projections.

KW - Database outsourcing

KW - Join algorithms

KW - Query authentication

UR - http://www.scopus.com/inward/record.url?scp=70849087019&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=70849087019&partnerID=8YFLogxK

U2 - 10.1145/1559845.1559849

DO - 10.1145/1559845.1559849

M3 - Conference contribution

SN - 9781605585543

SP - 5

EP - 17

BT - SIGMOD-PODS'09 - Proceedings of the International Conference on Management of Data and 28th Symposium on Principles of Database Systems

ER -