Taking Authenticated Range Queries to Arbitrary Dimensions

Taking Authenticated Range Queries to Arbitrary Dimensions

Taking Authenticated Range Queries to Arbitrary Dimensions Dimitrios Papadopoulos Stavros Papadopoulos Nikos Triandopoulos Boston University Intel Labs & MIT RSA Laboratories & Boston MA, USA Cambridge MA, USA Boston University [email protected] [email protected] Cambridge MA, USA [email protected] ABSTRACT needs for building a sophisticated and potentially costly infrastruc- We study the problem of authenticated multi-dimensional range ture, since storage and computationally intensive tasks are offloaded queries over outsourced databases, where an owner outsources its to the server. On the other hand, the server profits from accommo- database to an untrusted server, which maintains it and answers dating a large number of owners. Despite its merits, database out- queries to clients. Previous schemes either scale exponentially in sourcing poses the challenge that the server may be untrusted and, the number of query dimensions, or rely on heuristic data structures thus, tamper with the results (e.g., to bias the competition among without provable bounds. Most importantly, existing work requires rival serviced companies). Hence, it is vital that the server provides an exponential, in the database attributes, number of structures to the client with proofs certifying the result integrity, i.e., that the support queries on every possible combination of dimensions in the query was executed correctly on the owner’s data. database. In this paper, we propose the first schemes that (i) scale In this work we target the case where the client issues a multi- linearly with the number of dimensions, and (ii) support queries on dimensional range query. We model the owner’s database as a ta- any set of dimensions with linear in the number of attributes setup ble T that contains n tuples with m attribute values. A range query cost and storage. We achieve this through an elaborate fusion of is defined over d out of the m attributes, which we refer to as di- novel and existing set-operation sub-protocols. We prove the secu- mensions. It is expressed as d pairs of values li; ui, each along a rity of our solutions relying on the q-Strong Bilinear Diffie-Hellman certain dimension ai. Its result includes all the tuples whose value assumption, and experimentally confirm their feasibility. on ai is in range [li; ui] for all dimensions ai specified in the query. This query is fundamental in a vast variety of applications. For instance, it is a typical select:::where query in conventional rela- Categories and Subject Descriptors tional databases. Moreover, it is a frequent query in the emerging H.2.7 [Database Management]: Database Administration—secu- scientific databases (e.g., it is called subarray in SciDB [7]). Re- rity, integrity and protection; C.2.4 [Communication Networks]: lational and scientific database systems manage numerous types of Distributed Systems—client/server, distributed databases data, such as corporate, stock, astronomical, medical, etc. With the advent of “big data,” such systems are commonly deployed by third General Terms party servers in massively parallel architectures, in order to address the issue of scalability. Integrity assurance is a desirable property Algorithms, Security, Verification that serves both as a guarantee against a possibly malicious server, but also as a tool for error detection. Keywords Prior work. The most basic authentication problem is set member- authenticated range queries; authenticated data structures; delega- ship, i.e., whether an element belongs in a data collection. Well- tion of computation; database outsourcing known example schemes include Merkle trees [19] and accumu- lation trees [22]. At the opposite extreme, there exist generic ap- 1. INTRODUCTION proaches (e.g., [11, 25]) that aim at authenticating any possible Database outsourcing [16] has lately emerged as a common prac- query on outsourced data. Although such protocols can address our tice for companies and institutions. It allows a data owner to del- problem, they incur an excessive proof construction overhead at the egate the maintenance and administration of its database to a pow- server, due to their generality. Therefore, there is a large variety of erful third-party server. Clients access the database by contacting specialized constructions that have been proposed in the literature the server instead of the owner. This paradigm reduces the owner’s for the problem of authenticated multi-dimensional range queries. Martel et al. [18] provide a generalization of Merkle trees, which captures the case of multi-dimensional range queries. Chen et al. [9] Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed proposes a solution that is similar to [18], based on attribute do- for profit or commercial advantage and that copies bear this notice and the full cita- main partition and access control. For the restricted case of 1- tion on the first page. Copyrights for components of this work owned by others than dimensional and 2-dimensional queries, Goodrich et al. [14, 15] ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re- construct schemes based on cryptographic extensions of Merkle publish, to post on servers or to redistribute to lists, requires prior specific permission trees. Li et al. [17] propose a variant of the B+-tree that incor- and/or a fee. Request permissions from [email protected]. porates hash values similarly to the Merkle tree, for processing 1- CCS’14, November 3–7, 2014, Scottsdale, Arizona, USA. dimensional queries in external storage. Yang et al. [28] extend this Copyright 2014 ACM 978-1-4503-2957-6/14/11 ...$15.00. ∗ http://dx.doi.org/10.1145/2660267.2660373 . idea to multiple dimensions, by transforming the R -tree [4] into a 819 Scheme Setup Proof size Proof construction Verification Update Martel et al. [18] O(jT j logm−1 jT j) O(logd−1 jT j) O(logd−1 jT j) O(logd−1 jT j) O(logm−1 jT j) Chen et al. [9] O(jT j logm N) O(logd N) O(logd N) O(logd N) O(logm N) ~ Pd ~ Our basic scheme (using [19]) O(jT j log n) O(d log n) O( i=1 jRij) + O(d log n) O(jRj) + O(d log n) O(jT j) Our basic scheme (using [22]) O(jT j log n) O(d) O~(Pd jR j) + O(dn log n) O~(jRj) + O(d) O(jT j) i=1 i p Our update-efficient scheme (using [19]) O(jT j log n) O(d log n) O~(Pd jR j) + O(d log n) O~(jRj) + O(d log n) O(m n) i=1 i p ~ Pd ~ Our update-efficient scheme (using [22]) O(jT j log n) O(d) O( i=1 jRij) + O(dn log n) O(jRj) + O(d) O(m n) m: # attributes, n: # tuples, T (= mn): database size, d: # dimensions, R : partial result at dimension a , R: query result, N: maximum domain size, (0; 1] j j i i 2 Table 1: Comparison of asymptotic complexities of authenticated multi-dimensional range query schemes Merkle R∗-tree. There are also other cryptographically augmented an elaborate fusion of existing and novel intersection, union, and data structures (e.g., [20, 10] based on signatures instead of hashes). set-difference protocols, based on bilinear accumulators. The existing literature suffers from the following critical prob- This particular treatment of the problem, i.e., the efficient au- lems. On the one hand, the schemes of [18, 9] that provide guar- thentication of a d-dimensional range query via the combination of anteed (non-trivial) complexity bounds, scale exponentially with d separate 1-dimensional proofs, would not be feasible without the the number of dimensions d. On the other hand, the rest of the recent advances in set-operation authentication (e.g., [24, 8]). We approaches rely on the heuristic R∗-tree and fail to accommodate anticipate that future research will substantially improve the effi- more than a limit of dimensions in practice (e.g., more than 8), as ciency of the set-operation sub-protocols. Motivated by this, as an the performance and effectiveness of the index deteriorates with additional important contribution, we identify and abstract the set- dimensionality. Most importantly, all methods require an exponen- operation sub-protocols needed as building blocks in our schemes, tial in m number of structures to support queries on every possible and formulate a general framework that can integrate any future combination of dimensions in the database. This is because each improved machinery for set-operation authentication. structure is built on a specific set of dimensions, and different sets We formally prove our constructions secure under the q-Strong require separate structures. Bilinear Diffie-Hellman [5] assumption and the security of the un- Finally, there is a work by Xu [27] that, contrary to [18, 9], scales derlying set-membership schemes. We also provide an experimen- quadratically with d. However, this scheme falls within a different tal evaluation, demonstrating the feasibility of our schemes. model, as it necessitates multi-round interaction between server and Roadmap. Section 2 contains the necessary cryptographic back- client (as opposed to our non-interactive setting). Its security is ground. Section 3 formulates our problem. Section 4 presents our based on non-falsifiable “knowledge-type” assumptions. Moreover, basic scheme for authenticated multi-dimensional range query pro- this scheme makes use of functional encryption [6], considerably cessing, whereas Section 5 introduces an alternative construction reducing its potential for implementation. with optimized updates. Section 6 provides a thorough experimen- Our contributions. We introduce two schemes for authenticated tal evaluation of our solutions. Finally, Section 7 concludes our multi-dimensional range query processing; a basic, and a update- paper with directions to future work.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    12 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us