Yin Yang, Dimitris Papadias, Stavros Papadopoulos HKUST, Hong Kong Panos Kalnis KAUST, Saudi Arabia Providence, USA, 2009.

Slides:



Advertisements
Similar presentations
Secure Naming structure and p2p application interaction IETF - PPSP WG July 2010 Christian Dannewitz, Teemu Rautio and Ove Strandberg.
Advertisements

RRSIG:“I certify that this DNS record set is correct” Problem: how to certify a negative response, i.e. that a record doesn’t exist? NSEC:“I certify that.
Copyright © 2011 Ramez Elmasri and Shamkant Navathe Algorithms for SELECT and JOIN Operations (8) Implementing the JOIN Operation: Join (EQUIJOIN, NATURAL.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Digital Signatures and Hash Functions. Digital Signatures.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Public-key based. Public-key Techniques based Protocols –may use either weak or strong passwords –high computation complexity (Slow) –high deployment.
1 Chapter 10 Query Processing: The Basics. 2 External Sorting Sorting is used in implementing many relational operations Problem: –Relations are typically.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
Security Chapter The security environment 9.2 Basics of cryptography 9.3 User authentication 9.4 Attacks from inside the system 9.5 Attacks from.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Authenticating streamed data in the presence of random packet loss March 17th, Philippe Golle, Stanford University.
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
DSAC (Digital Signature Aggregation and Chaining) Digital Signature Aggregation & Chaining An approach to ensure integrity of outsourced databases.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
1 Query Processing: The Basics Chapter Topics How does DBMS compute the result of a SQL queries? The most often executed operations: –Sort –Projection,
DSAC (Digital Signature Aggregation and Chaining) Digital Signature Aggregation & Chaining An approach to ensure integrity of outsourced databases.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Security 2 Distributed Systems Lecture# 15. Overview Cryptography Symmetric Assymeteric Digital Signature Secure Digest Functions Authentication.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Query Evaluation and Optimization Main Steps 1.Translate into RA: select/project/join 2.Greedy optimization of RA: by pushing selection and projection.
1 Introduction to Information Security , Spring 2015 Lecture 7: Applied cryptography: asymmetric Eran Tromer Slides credit: John Mitchell, Stanford.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Computer Science Public Key Management Lecture 5.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Bob can sign a message using a digital signature generation algorithm
The RSA Algorithm Rocky K. C. Chang, March
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
CS 345: Topics in Data Warehousing Tuesday, October 19, 2004.
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
Computer Science iBigTable: Practical Data Integrity for BigTable in Public Cloud CODASPY 2013 Wei Wei, Ting Yu, Rui Xue 1/40.
Information Security Fundamentals Major Information Security Problems and Solutions Department of Computer Science Southern Illinois University Edwardsville.
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Certification asynchrone à grande échelle avec des arbres de vérification de certificats Josep Domingo-Ferrer Universitat Rovira i Virgili
Wai Kit Wong 1, Ben Kao 2, David W. Cheung 2, Rongbin Li 2, Siu Ming Yiu 2 1 Hang Seng Management College, Hong Kong 2 University of Hong Kong.
Computer Science Integrity Assurance for Outsourced Databases without DBMS Modification DBSec 2014 Wei Wei, Ting Yu 1.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
EE515/IS523 Think Like an Adversary Lecture 4 Crypto in a Nutshell Yongdae Kim.
Cryptography Lecture 9 Stefan Dziembowski
Query Processing. Steps in Query Processing Validate and translate the query –Good syntax. –All referenced relations exist. –Translate the SQL to relational.
ASYNCHRONOUS LARGE-SCALE CERTIFICATION BASED ON CERTIFICATE VERIFICATION TREES Josep Domingo-Ferrer, Marc Alba and Francesc Sebé Dept. of Computer Engineering.
This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 1 Authenticating.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Qian Chen, Haibo Hu, Jianliang Xu Hong Kong Baptist University Authenticating Top-k Queries in Location-based Services with Confidentiality1.
CS411 Database Systems Kazuhiro Minami 11: Query Execution.
Prepared by Dr. Lamiaa Elshenawy
Marwan Al-Namari Hassan Al-Mathami. Indexing What is Indexing? Indexing is a mechanisms. Why we need to use Indexing? We used indexing to speed up access.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
CS4432: Database Systems II Query Processing- Part 2.
Computer Science & Engineering 2111 Lecture 13 Outer Joins 1.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Query Processing CS 405G Introduction to Database Systems.
CS 440 Database Management Systems Lecture 5: Query Processing 1.
More Optimization Exercises. Block Nested Loops Join Suppose there are B buffer pages Cost: M + ceil (M/(B-2))*N where –M is the number of pages of R.
CS 540 Database Management Systems
Chapter 10 The Basics of Query Processing. Copyright © 2005 Pearson Addison-Wesley. All rights reserved External Sorting Sorting is used in implementing.
1 Introduction to Information Security , Spring 2016 Lecture 4: Applied cryptography: asymmetric Zvi Ostfeld Slides credit: Eran Tromer.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Authenticated Join Processing in Outsourced Databases
Database Management System
Performance Join Operator Select * from R, S where R.a = S.a;
Lecture 2- Query Processing (continued)
Ensuring Correctness over Untrusted Private Database
Presentation transcript:

Yin Yang, Dimitris Papadias, Stavros Papadopoulos HKUST, Hong Kong Panos Kalnis KAUST, Saudi Arabia Providence, USA, 2009

 Advantages  The data owner does not need the hardware / software / personnel to run a DBMS  The service provider achieves economy of scale  The client enjoys better quality of service  A main challenge  The service provider is not trusted, and may return incorrect query results 2

 The owner signs its data with a digital signature scheme  Given a query, the service provider attaches a VO (Verification Object) to the results  The client verifies query results with the VO and the owner’s signature  soundness  completeness 3

Range: σ quantity>100 Purchase Join: Purchase cid Customer Range & Join :(σ quantity>100 Purchase) cid (σ city=“New York” Customer) 4

 Range authentication: many solutions  Join authentication: few proposals  Materializing join results into views  AINL (presented in detail later)  Joins are inherently more complex than ranges  A join combines information from multiple tables  Only individual tables are signed 5

 Multi-dimensional range authentication  Y. Yang, S. Papadopoulos, D. Papadias, G. Kollios (BU)  ICDE’08, VLDB J.  Continuous range authentication  S. Papadopoulos, Y. Yang, D. Papadias  VLDB’07, VLDB J.  Novel authentication framework  S. Papadopoulos, D. Saccharidis, D. Papadias  ICDE’09 6

 Concepts in Cryptography  Authenticated Data Structure (ADS)  Merkle Hash Tree  MB-Tree  AINL 7

 One-way, collision-resistant hash functions  h = H(m)  Computationally infeasible to infer m from h, or to find two m 1, m 2 with the same hash value h  Example: SHA1, SHA2, …  Public-key encryption  Two keys: private key sk, public key pk  Public key to encrypt, private key to decrypt  Example: RSA  Digital Signature  Hard to forge without the secret key  Signing: s = encrypt(H(m), sk)  Verifying: check if H(m) = decrypt(s, pk) 8

 A binary tree with hash values satisfying h n = H(h n.lc | h n.rc )  Authenticates 1D range queries  Example: a query Q retrieves d 4, d 5  VO(Q) = {s root, h 1-2, d 3, d 4, d 5, d 6, h 7-8 }  The client re-constructs h Root bottom-up, and verifies the signature 9

 Merkle Hash Tree + B-Tree  Conceptually, a Merkle Hash Tree with a large fanout (>2) 10

 For binary joins  Requires ADS on the join attribute of the inner relation  Reduces a join query into multiple ranges  Algorithm  For every tuple in the outer relation Perform an authenticated range on the inner relation 11

12 r1r1 1. r 1, h F, h 10, s 11, s 12, h E 2. r 2, h 1, s 2, s 3, s 4, h 5, h 6, h C, h G 3. … r2r2

 Large VO size  |R| records from R (outer relation)  2|R|+|RS| records from |S| (inner relation)  Numerous hash values  Often larger than the combined size of R and S  High computation overhead at the server and the client 13

 The server transmits all the data to the client  The client performs the join locally  NAI often outperforms AINL 14

 Binary join authentication  AISM: requires ADS on one relation  AIM: requires ADSs on both relations  ASM: requires no ADS  Complex join query authentication  Multi-way join  Select-project-join 15

 Sort the outer relation R on the join attribute  Transmit all tuples in R to the client in their verifiable order  Transmit the sort order  R of R tuples on the join attribute  Incrementally traverse the ADS on S once with the R records 16

17  R [2]=4 VO: signature of R, root signature of T S, r 1 -r 6 in their verifiable order 1.  R [1], h 1, s 2, s 3, s 4 ; 2.  R [2], h 5, h 6, h C, s 10, s 11, s 12 ; 3.  R [3]; 4.  R [4]; 5.  R [5], h 13, h 14, s 15 ; 6.  R [6];  R [1]=2  R [3]=6  R [4]=1  R [5]=3  R [6]=5 r2r2 r1r1 r3r3 r4r4 r6r6 r5r5

 The client checks  R records  correctness of the sort order  R of R  boundary records  whether the re-constructed root hash of T S matches its signature 18

 Query processing  Require ADSs on both relations  Start with one relation R, traverse its ADS T R down to the first tuple r 1  Traverse T S until reaching the right boundary record s of r 1  Traverse T R until reaching the right boundary record r of s  Alternatively traverse T S and T R similarly to the above  Verification: similar to AISM 19

20 VO: root signature of T S, root signature of T R, r 1 1. h s 1, s 2, s 3, s 4 ; 2. r 2 ; 3. h s 5, h s 6, h C, s 10, s 11, s 12 ; 4. r 3, r 4 ; 5. r 5 ; 6. h s 13, h s 14, s 15 ; 7. h r 6 ;

 Idea  Sort-Merge-Join, sort at the server, merge at the client  Query processing  Require no ADS  Transmit both R and S in their verifiable order  Sort R and S respectively on the join attribute  Transmit the sort orders of R and S to the client  Transmit bitmaps B R and B S to the client, indicating the tuples with join partners  Verification  correctness of the base relations / sort-orders / the bitmaps 21

 Multi-way joins  Selection-Projection-Join queries 22

 Build a tree of binary join operators  m-ASM / m-AISM / m-AIM optimized for multi-way joins  Example:  A specialized algorithm AST applies when all relations are joined on the same attribute  One single VO 23

VO(RS):{root signature of T R and T S, s 1, s 2 ; h A, r 4, r 5, r 6 ; s 3 ; s 4 ; s 5 ; h C } VO(RST):{root signature of T T,  [1], t 1, t 2 ;  [2];  [3];  [4]; h t3 } 24

25

26  Selection  Use the m- algorithms for joins  Projection  Build a Merkle Hash Tree for each record  Query optimization

27  Three synthetic relations  R(a 1, a 2 )  S(a 1, a 2, b 1, b 2 )  T(b 1, b 2 )  Queries  R a 1 S  R a 2 S  ( R a 1 S ) b 1 T  ( R a 2 S ) b 2 T  Foreign keys  S.a 1 references R.a 1  S.b 1 references T.b 1  Parameters  Tuple size  Cardinality of |S|

 We participated in the ACM SIGMOD 2009 Repeatability & Workability Evaluation (cf.,  The reviewers were able to  repeat all the experiments presented in our paper,  yielding results that match the ones published in our paper,  except from insignificant and to be expected variation due to randomness and/or hardware/software differences.  The detailed reports will shortly be made publicly available by ACM SIGMOD. 28

29

30

31

32

33

 Binary join authentication  AISM: authenticated structure on one relation  AIM: authenticated structures on both relations  ASM: no authenticated structure  Complex query authentication  Multi-way join: eliminate unnecessary intermediate VO elements  Selection-projection-join query  Future Work  Authenticated Structures specialized to joins  Hash join instead of SMJ 34

35