Sciweavers

VLDB
2010
ACM

Continuous authentication on relational streams

13 years 10 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authenticated query processing enables the clients to verify the correctness of query results. Despite the abundance of methods for authenticated processing in conventional databases, there is limited work on outsourced data streams. Stream environments pose new challenges such as the need for fast structure updating, support for continuous query processing and authentication, and provision for temporal completeness. Specifically, in addition to the correctness of individual results, the client must be able to verify that there are no missing results in between data updates. This paper presents a comprehensive set of methods covering relational streams. We first describe REF, a technique that achieves correctness and temporal completeness but incurs false transmissions, i.e., the provider has to inform the clients whe...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
Added 31 Jan 2011
Updated 31 Jan 2011
Type Journal
Year 2010
Where VLDB
Authors Stavros Papadopoulos, Yin Yang, Dimitris Papadias
Comments (0)