Continuous authentication on relational streams

Stavros Papadopoulos, Yin Yang, Dimitris Papadias

Research output: Contribution to journalArticle

27 Citations (Scopus)

Abstract

According to the database outsourcing model, a data owner delegates database functionality to a third-party service provider, which answers queries received from clients. Authenticated query processing enables the clients to verify the correctness of query results. Despite the abundance of methods for authenticated processing in conventional databases, there is limited work on outsourced data streams. Stream environments pose new challenges such as the need for fast structure updating, support for continuous query processing and authentication, and provision for temporal completeness. Specifically, in addition to the correctness of individual results, the client must be able to verify that there are no missing results in between data updates. This paper presents a comprehensive set of methods covering relational streams. We first describe REF, a technique that achieves correctness and temporal completeness but incurs false transmissions, i.e., the provider has to inform the clients whenever there is a data update, even if their results are not affected. Then, we propose CADS, which minimizes the processing and transmission overhead through an elaborate indexing scheme and a virtual caching mechanism. In addition, we present an analytical study to determine the optimal indexing granularity, and extend CADS for the case that the data distribution changes over time. Finally, we evaluate the effectiveness of our techniques through extensive experiments.

Original languageEnglish
Pages (from-to)161-180
Number of pages20
JournalVLDB Journal
Volume19
Issue number2
DOIs
Publication statusPublished - 2010
Externally publishedYes

Fingerprint

Authentication
Query processing
Outsourcing
Processing
Experiments

Keywords

  • Authentication
  • Continuous monitoring
  • Data streams
  • Database outsourcing

ASJC Scopus subject areas

  • Information Systems
  • Hardware and Architecture

Cite this

Continuous authentication on relational streams. / Papadopoulos, Stavros; Yang, Yin; Papadias, Dimitris.

In: VLDB Journal, Vol. 19, No. 2, 2010, p. 161-180.

Research output: Contribution to journalArticle

Papadopoulos, Stavros ; Yang, Yin ; Papadias, Dimitris. / Continuous authentication on relational streams. In: VLDB Journal. 2010 ; Vol. 19, No. 2. pp. 161-180.
@article{2134b92600024d04b198c63a5127d1c5,
title = "Continuous authentication on relational streams",
abstract = "According to the database outsourcing model, a data owner delegates database functionality to a third-party service provider, which answers queries received from clients. Authenticated query processing enables the clients to verify the correctness of query results. Despite the abundance of methods for authenticated processing in conventional databases, there is limited work on outsourced data streams. Stream environments pose new challenges such as the need for fast structure updating, support for continuous query processing and authentication, and provision for temporal completeness. Specifically, in addition to the correctness of individual results, the client must be able to verify that there are no missing results in between data updates. This paper presents a comprehensive set of methods covering relational streams. We first describe REF, a technique that achieves correctness and temporal completeness but incurs false transmissions, i.e., the provider has to inform the clients whenever there is a data update, even if their results are not affected. Then, we propose CADS, which minimizes the processing and transmission overhead through an elaborate indexing scheme and a virtual caching mechanism. In addition, we present an analytical study to determine the optimal indexing granularity, and extend CADS for the case that the data distribution changes over time. Finally, we evaluate the effectiveness of our techniques through extensive experiments.",
keywords = "Authentication, Continuous monitoring, Data streams, Database outsourcing",
author = "Stavros Papadopoulos and Yin Yang and Dimitris Papadias",
year = "2010",
doi = "10.1007/s00778-009-0145-2",
language = "English",
volume = "19",
pages = "161--180",
journal = "VLDB Journal",
issn = "1066-8888",
publisher = "Springer New York",
number = "2",

}

TY - JOUR

T1 - Continuous authentication on relational streams

AU - Papadopoulos, Stavros

AU - Yang, Yin

AU - Papadias, Dimitris

PY - 2010

Y1 - 2010

N2 - According to the database outsourcing model, a data owner delegates database functionality to a third-party service provider, which answers queries received from clients. Authenticated query processing enables the clients to verify the correctness of query results. Despite the abundance of methods for authenticated processing in conventional databases, there is limited work on outsourced data streams. Stream environments pose new challenges such as the need for fast structure updating, support for continuous query processing and authentication, and provision for temporal completeness. Specifically, in addition to the correctness of individual results, the client must be able to verify that there are no missing results in between data updates. This paper presents a comprehensive set of methods covering relational streams. We first describe REF, a technique that achieves correctness and temporal completeness but incurs false transmissions, i.e., the provider has to inform the clients whenever there is a data update, even if their results are not affected. Then, we propose CADS, which minimizes the processing and transmission overhead through an elaborate indexing scheme and a virtual caching mechanism. In addition, we present an analytical study to determine the optimal indexing granularity, and extend CADS for the case that the data distribution changes over time. Finally, we evaluate the effectiveness of our techniques through extensive experiments.

AB - According to the database outsourcing model, a data owner delegates database functionality to a third-party service provider, which answers queries received from clients. Authenticated query processing enables the clients to verify the correctness of query results. Despite the abundance of methods for authenticated processing in conventional databases, there is limited work on outsourced data streams. Stream environments pose new challenges such as the need for fast structure updating, support for continuous query processing and authentication, and provision for temporal completeness. Specifically, in addition to the correctness of individual results, the client must be able to verify that there are no missing results in between data updates. This paper presents a comprehensive set of methods covering relational streams. We first describe REF, a technique that achieves correctness and temporal completeness but incurs false transmissions, i.e., the provider has to inform the clients whenever there is a data update, even if their results are not affected. Then, we propose CADS, which minimizes the processing and transmission overhead through an elaborate indexing scheme and a virtual caching mechanism. In addition, we present an analytical study to determine the optimal indexing granularity, and extend CADS for the case that the data distribution changes over time. Finally, we evaluate the effectiveness of our techniques through extensive experiments.

KW - Authentication

KW - Continuous monitoring

KW - Data streams

KW - Database outsourcing

UR - http://www.scopus.com/inward/record.url?scp=77951939042&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77951939042&partnerID=8YFLogxK

U2 - 10.1007/s00778-009-0145-2

DO - 10.1007/s00778-009-0145-2

M3 - Article

VL - 19

SP - 161

EP - 180

JO - VLDB Journal

JF - VLDB Journal

SN - 1066-8888

IS - 2

ER -