Font Size: a A A

Authentication Of Relational Query Based On Signature Chain

Posted on:2012-10-02Degree:MasterType:Thesis
Country:ChinaCandidate:X L LiaoFull Text:PDF
GTID:2248330395458137Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In data publishing model under distributed environment, the publish servers may not be completely trusted, and data from them may be altered, forged or lost. If there is no effective security mechanism provided by server, users will get the wrong results that cause serious consequences. Therefore, in data publishing model, how to guarantee the correctness of query results from publish servers is becoming an important problem.In the existing query authentication techniques, servers generally need to return the value of the boundary records not within query range to the users. So the users will have an opportunity to get the data outside their access right, which violates database access control policy. On the other hand, the existing query authentication techniques generally only support the authentication of range selection query results, but not aggregate query. With respecting to these security issues, this paper proposes a query authentication method based on Signature Chain which verifies authenticity (i.e., all the result values are legitimate) and completeness (i.e., no qualifying tuples are omitted) of range selection, projection, as well as primary key-foreign key join queries results. This paper gives the specific algorithms, safety analysis and proof as well as costs analysis for the proposed authentication method. In addition, this paper also extends Signature Chain, and presents an authentication method based on Partial Sum Hierarchy (PSH) for single-attribute range aggregate query.Finally, this paper applies the proposed query authentication methods to the database query system, and develops a query authentication prototype system which implemented by B/S architecture and can authenticates correctness of common various relational queries results. The research results show that the proposed authentication methods of relational query based on Signature Chain are practical and feasible schemes with low overheads, and have important theory and application value.
Keywords/Search Tags:relational query authentication, signature chain, PSH, authenticity, completeness
PDF Full Text Request
Related items