ABSTRACT
We present an update-efficient authenticated dictionary towards the goal of providing public verification of outsourced dynamic geospatial data consolidated from a dynamic set of contributing sources. We introduce an on-disk authenticated bucket-based PR-quadtree for point and range queries over multiple attributes with minimal tree realignment upon updates. Our design minimizes cryptographic proof overhead using large, block-aligned tree nodes for high fanout and incremental cumulative hashing to consolidate neighboring elements required for verifying completeness. We introduce block-dependent indexing to reduce cryptographic recalculations required upon updates. Collectively, our design decisions result in an authenticated dictionary capable of efficiently incorporating individual updates or entire pre-existing data sets. We validate our approach with simulated data sets derived from experiences managing the Mississippi River floods of May 2011.
- Bellare, M., et al. A new paradigm for collision-free hashing: Incrementality at reduced cost. In Eurocrypt97 (1997). Google ScholarDigital Library
- Belopotosky, D. Data mining helps uncover fraud in disaster relief. http://www.nationaljournal.com/, June 2006.Google Scholar
- Boldyreva, A. Efficient threshold signature, multisignature and blind signature schemes based on the gap-diffie-hellman-group signature scheme. In Proceedings of PKC 2003 (2003). Google ScholarDigital Library
- Chen, S., et al. Fractal prefetching B+-trees: optimizing both cache and disk performance. In SIGMOD International Conference on Management of Data (2002), ACM Press. Google ScholarDigital Library
- Cheng, W., et al. Authenticating multi-dimensional query results in data publishing. In DBSec (2006). Google ScholarDigital Library
- Devanbu, P. T., et al. Authentic third-party data publication. In Annual Working Conference on Database Security (2001). Google ScholarDigital Library
- Goh, E., et al. Sirius: Securing remote untrusted storage. In Network and Distributed Systems Security Symposium (2003).Google Scholar
- Goodrich, M. T., et al. Authenticated dictionaries for fresh attribute credentials. In 1st international conference on Trust management (2003). Google ScholarDigital Library
- Hacigumus, H., et al. Providing database as a service. In 18th International Conference on Data Engineering (2002), ICDE '02. Google ScholarDigital Library
- Hu, L., et al. Verifying spatial queries using voronoi neighbors. In 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems (2010). Google ScholarDigital Library
- Li, F., et al. Dynamic authenticated index structures for outsourced databases. In SIGMOD (2006), SIGMOD. Google ScholarDigital Library
- Li, F., et al. Authenticated index structures for aggregation queries. ACM Trans. Inf. Syst. Secur. 13 (2010). Google ScholarDigital Library
- Lomet, D. The evolution of effective B-tree: Page organization and techniques: A personal account. In ACM SIGMOD Record (Sept. 2001). Google ScholarDigital Library
- Merkle, R. A certified digital signature. Advances in Cryptology 435 (1990). Google ScholarDigital Library
- Mouratidis, K., Sacharidis, D., and Pang, H. Partially materialized digest scheme: an efficient verification method for outsourced databases. The VLDB Journal 18, 1 (2009), 363--381. Google ScholarDigital Library
- Naor, M., and Nissim, K. Certificate revocation and certificate update. Journal on Selected Areas in Communications 18, 4 (Apr. 1999). Google ScholarDigital Library
- Narasimha, M., and Tsudik, G. Authentication of outsourced databases using signature aggregation and chaining. In Database Systems for Advanced Applications (2006). Google ScholarDigital Library
- Nelson, R. C., and Samet, H. A consistent hierarchical representation for vector data. SIGGRAPH Comput. Graph. 20 (August 1986). Google ScholarDigital Library
- Nuckolls, G., et al. Certifying data from multiple sources {extended abstract}. In ACM Conference on Electronic Commerce (2003). Google ScholarDigital Library
- Papadopoulos, S., et al. Continuous spatial authentication. In Symposium on Advances in Spatial and Temporal Databases (2009). Google ScholarDigital Library
- Samet, H. Foundations of Multidimensional and Metric Data Structures. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2005. Google ScholarDigital Library
- Ware, J. Geospatial data fusion: Training gis for disaster relief operations. In National Geospatial Intelligence School (2009).Google Scholar
- Yang, Y., et al. Authenticated join processing in outsourced databases. In SIGMOD international conference on Management of data (2009). Google ScholarDigital Library
- Yang, Y., Papadopoulos, S., Papadias, D., and Kollios, G. Spatial outsourcing for location-based services. In ICDE (2008). Google ScholarDigital Library
- Yang, Y., Papadopoulos, S., Papadias, D., and Kollios, G. Authenticated indexing for outsourced spatial databases. The VLDB Journal 18 (June 2009), 631--648. Google ScholarDigital Library
- Yumerefendi, A. R., and Chase, J. S. Strong accountability for network storage. Transactions on Storage (2007). Google ScholarDigital Library
Index Terms
- APR-Quad: an update efficient authenticated dictionary for spatial data
Recommendations
Deletion in two-dimensional quad trees
An algorithm for deletion in two-dimensional quad trees that handles the problem in a manner analogous to deletion in binary search trees is presented. The algorithm is compared with a proposed method for deletion which reinserts all of the nodes in the ...
Quad-kd trees
We introduce the quad-kd tree: a general purpose and hierarchical data structure for the storage of multidimensional points. Quad-kd trees include point quad trees and kd trees as particular cases and therefore they could constitute a general framework ...
Analysis of QUAD
FSE'07: Proceedings of the 14th international conference on Fast Software EncryptionIn a Eurocrypt 2006 article entitled "QUAD: A Practical Stream Cipher with Provable Security," Berbain, Gilbert, and Patarin introduced QUAD, a parametrized family of stream ciphers. The article stated that "the security of the novel stream cipher is ...
Comments