MARS: Enabling Verifiable Range-Aggregate Queries in Multi-Source Environments

被引:6
作者
Liu, Qin [1 ]
Peng, Yu [1 ]
Xu, Qian [1 ]
Jiang, Hongbo [1 ]
Wu, Jie [2 ]
Wang, Tian [3 ]
Peng, Tao [4 ]
Wang, Guojun [4 ]
Zhang, Shaobo [5 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[2] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[3] Beijing Normal Univ & UIC, Artificial Intelligence & Future Networks, Zhuhai 519000, Guangdong, Peoples R China
[4] Guangzhou Univ, Sch Comp Sci & Cyber Engn, Guangzhou 510006, Guangdong, Peoples R China
[5] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Hunan, Peoples R China
关键词
Aggregates; Data integration; Soft sensors; Data models; Computer science; Scalability; Fuses; Authentication; cloud computing; data fusion; multi-source data; range-aggregate queries; AUTHENTICATION; EFFICIENT; SECURE;
D O I
10.1109/TDSC.2023.3299337
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The huge values created by Big Data and the recent advances in cloud computing have been driving data from different sources into cloud repositories for comprehensive query services. However, cloud-based data fusion makes it challenging to verify if an untrusted server faithfully integrates data and executes queries or not. This is even harder for range-aggregate queries that apply aggregate operations on data within given ranges. In this article, we propose a query authentication scheme, named MARS, enabling a user to efficiently authenticate range-aggregate queries on multi-source data. Specifically, MARS creates a VG-tree by subtly integrating Expressive Set Accumulator into a multi-dimensional G-tree while signing the root digest with a multi-source aggregate signature scheme. Compared with previous solutions, MARS has the following merits: (1) Practicality. Instead of treating range and aggregate queries separately, the user can directly verify the statistical result of selected data. (2) Scalability. Instead of authenticating the individual result from each source, the user can perform an aggregative validation on the integrated result from multiple sources. The experimental results demonstrate the effectiveness of MARS. For large-scale data fusion, the user-side verification time increases by only 103 ms as the amount of data sources increases by five times.
引用
收藏
页码:1994 / 2011
页数:18
相关论文
共 36 条
[1]  
[Anonymous], 2023, Amazon cloud directory
[2]   On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System [J].
Bagga, Palak ;
Das, Ashok Kumar ;
Wazid, Mohammad ;
Rodrigues, Joel J. P. C. ;
Choo, Kim-Kwang Raymond ;
Park, YoungHo .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (02) :1736-1751
[3]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[4]  
Boneh D, 2001, P 7 INT C THEOR APPL, P514, DOI [10.1007/s00145-004-0314-9, DOI 10.1007/S00145-004-0314-9]
[5]   Short signatures without random oracles and the SDH assumption in bilinear groups [J].
Boneh, Dan ;
Boyen, Xavier .
JOURNAL OF CRYPTOLOGY, 2008, 21 (02) :149-177
[6]   Efficient and Scalable Query Authentication for Cloud-Based Storage Systems with Multiple Data Sources [J].
Chandrasekhar, Santosh ;
Singhal, Mukesh .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (04) :520-533
[7]  
Chandrasekhar S, 2014, IEEE CONF COMM NETW, P463, DOI 10.1109/CNS.2014.6997516
[8]   Authenticated Online Data Integration Services [J].
Chen, Qian ;
Hu, Haibo ;
Xu, Jianliang .
SIGMOD'15: PROCEEDINGS OF THE 2015 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2015, :167-181
[9]   SVkNN: Efficient Secure and Verifiable k-Nearest Neighbor Query on the Cloud Platform [J].
Cui, Ningning ;
Yang, Xiaochun ;
Wang, Bin ;
Li, Jianxin ;
Wang, Guoren .
2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2020), 2020, :253-264
[10]  
Dai Y, 2020, AAAI CONF ARTIF INTE, V34, P7618