String matching query verification on the cloud-hosted databases

Riaz-ud-Din, Faizal, Doss, Robin and Zhou, Wanlei 2016, String matching query verification on the cloud-hosted databases, in IICDCN 2016 : Proceedings of the 17th International Conference on Distributed Computing and Networking, [The Conference], [Singapore], pp. 1-10, doi: 10.1145/2833312.2833326.

Attached Files
Name Description MIMEType Size Downloads

Title String matching query verification on the cloud-hosted databases
Author(s) Riaz-ud-Din, Faizal
Doss, RobinORCID iD for Doss, Robin orcid.org/0000-0001-6143-6850
Zhou, WanleiORCID iD for Zhou, Wanlei orcid.org/0000-0002-1680-2521
Conference name Distributed Computing and Networking. Conference (17th : 2016 : Singapore)
Conference location Singapore
Conference dates 4-7 Jan. 2016
Title of proceedings IICDCN 2016 : Proceedings of the 17th International Conference on Distributed Computing and Networking
Publication date 2016
Start page 1
End page 10
Total pages 10
Publisher [The Conference]
Place of publication [Singapore]
Keyword(s) query verification
pattern matching
suffix arrays
Merkle hash tree
Summary Database query verification schemes attempt to provide authenticity, completeness, and freshness guarantees for queries executed on untrusted cloud servers. A number of such schemes currently exist in the literature, allowing query verification for queries that are based on matching whole values (such as numbers, dates, etc.) or for queries based on keyword matching. However, there is a notable gap in the research with regard to query verification schemes for pattern-matching queries. Our contribution here is to provide such a verification scheme that provides correctness guarantees for pattern-matching queries executed on the cloud. We describe a trivial scheme, ȃŸż and show how it does not provide completeness guarantees, and then proceed to describe our scheme based on efficient primitives such as cryptographic hashing and Merkle hash trees along with suffix arrays. We also provide experimental results based on a working prototype to show the practicality of our scheme.Ÿż
ISBN 9781467396226
Language eng
DOI 10.1145/2833312.2833326
Field of Research 080303 Computer System Security
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
ERA Research output type E Conference publication
Copyright notice ©2016, The Conference
Persistent URL http://hdl.handle.net/10536/DRO/DU:30083247

Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 1 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 343 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Thu, 05 May 2016, 11:21:16 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.