skip to main content
research-article

Lightweight authentication of linear algebraic queries on data streams

Published: 22 June 2013 Publication History
  • Get Citation Alerts
  • Abstract

    We consider a stream outsourcing setting, where a data owner delegates the management of a set of disjoint data streams to an untrusted server. The owner authenticates his streams via signatures. The server processes continuous queries on the union of the streams for clients trusted by the owner. Along with the results, the server sends proofs of result correctness derived from the owner's signatures, which are easily verifiable by the clients. We design novel constructions for a collection of fundamental problems over streams represented as linear algebraic queries. In particular, our basic schemes authenticate dynamic vector sums and dot products, as well as dynamic matrix products. These techniques can be adapted for authenticating a wide range of important operations in streaming environments, including group by queries, joins, in-network aggregation, similarity matching, and event processing. All our schemes are very lightweight, and offer strong cryptographic guarantees derived from formal definitions and proofs. We experimentally confirm the practicality of our schemes.

    References

    [1]
    D. Abadi, D. Carney, U. Çetintemel, M. Cherniack, C. Convey, C. Erwin, E. Galvez, M. Hatoun, A. Maskey, A. Rasin, A. Singer, M. Stonebraker, N. Tatbul, Y. Xing, R. Yan, and S. Zdonik. Aurora: A Data Stream Management System. In SIGMOD, 2003.
    [2]
    S. Agrawal and D. Boneh. Homomorphic MACs: MAC-Based Integrity for Network Coding. In ACNS, 2009.
    [3]
    A. Arasu, B. Babcock, S. Babu, M. Datar, K. Ito, I. Nishizawa, J. Rosenstein, and J. Widom. STREAM: The Stanford Stream Data Manager (demonstration description). In SIGMOD, 2003.
    [4]
    D. Boneh and D. M. Freeman. Homomorphic Signatures for Polynomial Functions. In EUROCRYPT, 2011.
    [5]
    J. Camenisch, M. Kohlweiss, and C. Soriente. An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials. In PKC, 2009.
    [6]
    A. Chakrabarti, G. Cormode, and A. McGregor. Annotations in Data Streams. In ICALP, 2009.
    [7]
    G. Cormode, J. Thaler, and K. Yi. Verifying computations with streaming interactive proofs. In VLDB, 2012.
    [8]
    C. Cranor, T. Johnson, O. Spatscheck, and V. Shkapenyuk. Gigascope: A Stream Database for Network Applications. In SIGMOD, 2003.
    [9]
    A. Das, J. Gehrke, and M. Riedewald. Approximate Join Processing Over Data Streams. In SIGMOD, 2003.
    [10]
    A. J. Demers, J. Gehrke, B. Panda, M. Riedewald, V. Sharma, and W. M. White. Cayuga: A general purpose event monitoring system. In CIDR, 2007.
    [11]
    P. Devanbu, M. Gertz, C. Martel, and S. G. Stubblebine. Authentic Data Publication over the Internet. J. Comput. Secur., 11(3):291--314, 2003.
    [12]
    M. N. Garofalakis, J. M. Hellerstein, and P. Maniatis. Proof Sketches: Verifiable In-Network Aggregation. In ICDE, 2007.
    [13]
    O. Goldreich. The Foundations of Cryptography - Volume 1, Basic Techniques. Cambridge University Press, 2001.
    [14]
    S. Goldwasser, Y. T. Kalai, and G. N. Rothblum. Delegating Computation: Interactive Proofs for Muggles. In STOC, 2008.
    [15]
    J. Katz and Y. Lindell. Introduction to Modern Cryptography. Chapman and Hall/CRC Press, 2007.
    [16]
    F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin. Dynamic Authenticated Index Structures for Outsourced Databases. In SIGMOD, 2006.
    [17]
    F. Li, K. Yi, M. Hadjieleftheriou, and G. Kollios. Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams. In VLDB, 2007.
    [18]
    S. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong. Tag: a tiny aggregation service for ad-hoc sensor networks. In OSDI, 2002.
    [19]
    A. J. Menezes, S. A. Vanstone, and P. C. V. Oorschot. Handbook of Applied Cryptography. CRC Press, Inc., 1996.
    [20]
    Microsoft. StreamInsight. http://msdn.microsoft.com/en-us/library/ee362541.aspx, 2010.
    [21]
    H. Nasgaard, B. Gedik, M. Komor, and M. P. Mendell. IBM Infosphere Streams: Event Processing for a Smarter Planet. In CASCON, 2009.
    [22]
    S. Nath and R. Venkatesan. Publicly Verifiable Grouped Aggregation Queries on Outsourced Data Streams. In ICDE, 2013.
    [23]
    S. Nath, H. Yu, and H. Chan. Secure Outsourced Aggregation via One-way Chains. In SIGMOD, 2009.
    [24]
    H. Pang, A. Jain, K. Ramamritham, and K.-L. Tan. Verifying Completeness of Relational Query Results in Data Publishing. In SIGMOD, 2005.
    [25]
    H. Pang and K.-L. Tan. Authenticating Query Results in Edge Computing. In ICDE, 2004.
    [26]
    S. Papadopoulos, A. Kiayias, and D. Papadias. Secure and Efficient In-Network Processing of Exact SUM Queries. In ICDE, 2011.
    [27]
    S. Papadopoulos, Y. Yang, and D. Papadias. CADS: Continuous Authentication on Data Streams. In VLDB, 2007.
    [28]
    V. Shoup. Lower Bounds for Discrete Logarithms and Related Problems. In EUROCRYPT, 1997.
    [29]
    S. Viglas, J. F. Naughton, and J. Burger. Maximizing the Output Rate of Multi-Way Join Queries over Streaming Information Sources. In VLDB, 2003.
    [30]
    Y. Yang, D. Papadias, S. Papadopoulos, and P. Kalnis. Authenticated Join Processing in Outsourced Databases. In SIGMOD, 2009.
    [31]
    K. Yi, F. Li, G. Cormode, M. Hadjieleftheriou, G. Kollios, and D. Srivastava. Small Synopses for Group-by Query Verification on Outsourced Data Streams. TODS, 34(3), 2009.

    Cited By

    View all
    • (2024)Research progress of verifiable technologies for outsourcing servicesSCIENTIA SINICA Informationis10.1360/SSI-2022-036054:3(514)Online publication date: 6-Mar-2024
    • (2023)Verify De-Duplication Using Blockchain on Data with Smart Contract Techniques for Detecting Errors on CloudExpert Clouds and Applications10.1007/978-981-99-1745-7_64(885-896)Online publication date: 2-Jul-2023
    • (2021)Integrity Checking for Aggregate QueriesIEEE Access10.1109/ACCESS.2021.30797999(74068-74084)Online publication date: 2021
    • Show More Cited By

    Index Terms

    1. Lightweight authentication of linear algebraic queries on data streams

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        SIGMOD '13: Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data
        June 2013
        1322 pages
        ISBN:9781450320375
        DOI:10.1145/2463676
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 22 June 2013

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. data integrity
        2. data streams
        3. query authentication

        Qualifiers

        • Research-article

        Conference

        SIGMOD/PODS'13
        Sponsor:

        Acceptance Rates

        SIGMOD '13 Paper Acceptance Rate 76 of 372 submissions, 20%;
        Overall Acceptance Rate 785 of 4,003 submissions, 20%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)2
        • Downloads (Last 6 weeks)0

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Research progress of verifiable technologies for outsourcing servicesSCIENTIA SINICA Informationis10.1360/SSI-2022-036054:3(514)Online publication date: 6-Mar-2024
        • (2023)Verify De-Duplication Using Blockchain on Data with Smart Contract Techniques for Detecting Errors on CloudExpert Clouds and Applications10.1007/978-981-99-1745-7_64(885-896)Online publication date: 2-Jul-2023
        • (2021)Integrity Checking for Aggregate QueriesIEEE Access10.1109/ACCESS.2021.30797999(74068-74084)Online publication date: 2021
        • (2020)Privacy-Preserving Lightweight Data Monitoring in Internet of Things EnvironmentsWireless Personal Communications10.1007/s11277-020-07760-x116:3(1765-1783)Online publication date: 31-Aug-2020
        • (2019)Improved publicly verifiable group sum evaluation over outsourced data streams in IoT settingComputing10.1007/s00607-018-0641-6101:7(773-790)Online publication date: 1-Jul-2019
        • (2019)IoT SecurityTowards the Internet of Things10.1007/978-3-030-18468-1_3(33-83)Online publication date: 13-Jun-2019
        • (2018)Authenticating Aggregate Queries over Set-Valued Data with ConfidentialityIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2017.277354130:4(630-644)Online publication date: 1-Apr-2018
        • (2018)Publicly Verifiable 1-norm and 2-norm Operations over Outsourced Data Stream Under Single-Key SettingAdvances in Internet, Data & Web Technologies10.1007/978-3-319-75928-9_41(462-469)Online publication date: 24-Feb-2018
        • (2017)Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple KeysIEEE Transactions on Services Computing10.1109/TSC.2016.253166510:5(826-838)Online publication date: 1-Sep-2017
        • (2017)Assuring Spatio-Temporal Integrity on Mobile Devices with Minimum Location DisclosureIEEE Transactions on Mobile Computing10.1109/TMC.2017.268349216:11(3000-3013)Online publication date: 1-Nov-2017
        • Show More Cited By

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media