DOC PREVIEW
USC CSCI 599 - Nima

This preview shows page 1-2-3 out of 8 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

11/24/20091Dynamic Authenticated Index Structures for Outsourced Databases1Feifei Li, Marios Hadjieleftheriou, George Kollios, Leonid ReyzinBoston University AT&T Labs‐ResearchPresenter : Nima NajafianOutline☺ The Model☺ Motivation☺ Problem☺ Solution☺ Background☺ Papers contributions☺ Experimental validationOutsourced Database ModelOwner: publish dataServers: host the data and provide query servicesClients: query the owner’s data through serversSD3ownerserversclientsMotivation• Advantages– The data owner does not need the hardware / software / personnel to run a DBMS–Theownerachieveseconomies of scaleThe ownerachieveseconomies of scale– The client enjoys better quality of service A main challenge– The service provider is not trusted, and may return incorrect query resultsProblem☺ Un‐trusted ServersUn‐trusted server• Lazy: incentives to perform less• Curious: incentives to acquire information• Malicious–Incorrect results ( could be bugs)– Possibly compromised11/24/20092Problem 1: InjectionSDSelect * from T where 5<A<11Returns 7, 8, 9ownerclient7ABr1………ri-14ri7ri+19ri+211ABr1………ri-14ri7ri+19ri+2117, 8, 9serverProblem 2: DropSDSelect * from T where 5<A<11Returns 7ownerclient8ABr1………ri-14ri7ri+19ri+211ABr1………ri-14ri7ri+19ri+211server9ri+1Solution☺ The Model☺ Motivation☺ Problem☺ Ability to authenticate without trusting the servery g(Query Authentication)Query Authentication: (the dimensions)• Query Correctnessresults do exist in the owner's database ~ injection• Query Completenessno records ha ve been omitted from the result ~ droph★10• Query Freshness★results are based on the most current version of the database ( this will bring a third problem into the picture ) ~omissionGeneral ApproachABr1………Authenticated StructuresVerification Object (VO)SD11ownerserversclientsri-14ri7Query resultsBackground☺Cryptographic essentials11/24/200931: Collision‐resistant hash functions• It is computational hard to find x1and x2 s.t. h(x1)=h(x2)• Computational hard? Based on well established assumptions such as discrete logarithms SHA113•SHA1 • Observations:– variable input size  20 bytes – Computation cost: 2‐3 μs (for up to 500 bytes input)– Storage cost: 20 bytes– Under Crypto++ [crypto] and OpenSSL [openssl]2: Public key digital signature schemesSenderRecipientmInsecure Channel14RecipientKeyGen →(SK, PK)σVer(m, PK, σ) → valid?mσSKSign(m, SK) →σ2: Public Key Digital Signature Schemes• Formally defined by [GMR88] – The message has not been changed in any way– The message is indeed from the sender (corresponding to the public key)– No one except the secret key owner could produce a signature• One such scheme: RSA [RSA78]• Observations–Computation cost: about 3‐4 ms for signing and more than 100μsfor15–Computation cost: about 3‐4 ms for signing and more than 100 μsfor verifying– Storage cost: 128 bytes– Checking one aggregated signature is almost as fast as an individual signature3: Signature Aggregation (Condensed RSA)4: Merkle Hash Tree[M89]-Amortizing Signature Costh1..4h5..8h1..8σSign(h1..8,SK)h5..8h1..4h1..8Ver(h1..8, σ ,pK)=valid?σCollision resistant hash function any change in the tree will lead to a different hash value for the rootDigital signature of the root  no one except the ownercould produce the signatureHash function is publicly knownSingle signature to sign many messages16m1m2m3m4m5m6m7m8h1h2h3h4h5h6h7h8h12h34h56h78h12=H(h1|h2)m6h78h5h6m5h56Correctness and Completeness• Correctness, Completeness:– Any change in the tree will lead to different hash– Relative position of values is authenticatedAth ti ti17•Authentication: – Signing the root with SKContributions☺ Proposed authenticated structures Getting to know B+ trees The idea of changingASB Tree (based onexisting work)ASB Tree (based on existing work) MB tree (based on existing work) EMB treeFreshness (third dimension of query Authentication)11/24/20094B+ ‐ Tree Structure• A typical node contains up to n –1 search key values K1, K2,…, Kn‐1, and n point ers P1, P2,…, Pn. The search key values are kept in sorted order.• The pointer Pi can point to either a file record or a 19bucket of pointers which each poin t to a file record.P1 K1 P2 … Pn-1 Kn-1 PnB+ ‐ Tree File OrganizationIn a B+ ‐ Tree file organization, the leaf nodes of the tree stores the actual record rather than storing pointers to records.20()iisig h r=Produced by the ownerSent to the clientcorrectness but NOTcompleteness !!!Range Authentication –A Simple Approach1r2r3r4r5r6r7r8r9r10r11r12r13r14r15r16rQ3sig4sig5sig6sigiiSent to the client along with 3456,,,rrrrSignature‐Based Approach: ASB Tree based on [PJR05]B+ Tree22S(r1|r2) S(r2|r3) … … S(n‐2|rn‐1) S(rn‐1|rn)1. order database tuples w.r.t query attribute2. sign consecutive pairs3. build B+ tree on top of it4. return tuples [a‐1, b+1] together with signatures in [a‐1, b]. (query is [a, b]) (a, b here are index)5. verify any two consecutive pairsCondensed RSA (NDSS’04)• Server:– Selects records matching posed query– Multiplies corresponding RSA signatures– Returns single signature to querierSQi23Given t record signatures:{σ1, σ2… σt} , compute combined signature σ1,t = Πσi mod n Send σ1,t to the querierServerσ1,tGiven t messages:{m1,m2… mt} and σ1,t verify combined signature:(σ1,t)e = ? = Π h(mi) (mod n)QuerierN is RSA modulus of the public key from the ownerComparing Cryptographic OP• one hashing takes 2‐3 μs– Modular Multiplication ‐100 times slower– Verifying ‐1000 times slowerSigning10000 times slower24–Signing ‐10000 times slowertHashing<tmod_M<tver<tSign11/24/20095Reduce S/C communication Cost • Aggregation Signature: Condensed RSA m1mkm1mk25σ1σkσσ=combine(σ1,…, σk) Overhead: computation cost of modular multiplication with big modular base number, close to 100 μs• A heavy burden on the owner to produce the signatures• Overhead on the client to verify the aggregated signatureSignature Chaining Issues• Storage overhead at the server to store the signatures (which potentially leads to higher computational cost to retrieve them)• High communication overhead on both the server and the owner, in order to exchange the signaturesMerkle B(MB) Tree: Natural Extension for Range Query•


View Full Document

USC CSCI 599 - Nima

Documents in this Course
Week8_1

Week8_1

22 pages

Week2_b

Week2_b

10 pages

LECT6BW

LECT6BW

20 pages

LECT6BW

LECT6BW

20 pages

5

5

44 pages

12

12

15 pages

16

16

20 pages

Week1

Week1

38 pages

Week11_c

Week11_c

30 pages

afsin

afsin

5 pages

October5b

October5b

43 pages

Week11_2

Week11_2

20 pages

final

final

2 pages

c-4

c-4

12 pages

0420

0420

3 pages

Week9_b

Week9_b

20 pages

S7Kriegel

S7Kriegel

21 pages

Week4_2

Week4_2

16 pages

sandpres

sandpres

21 pages

Week6_1

Week6_1

20 pages

4

4

33 pages

Week10_c

Week10_c

13 pages

fft

fft

18 pages

LECT7BW

LECT7BW

19 pages

24

24

15 pages

14

14

35 pages

Week9_c

Week9_c

24 pages

Week11_67

Week11_67

22 pages

Week1

Week1

37 pages

LECT3BW

LECT3BW

28 pages

Week8_c2

Week8_c2

19 pages

Week5_1

Week5_1

19 pages

LECT5BW

LECT5BW

24 pages

Week10_b

Week10_b

16 pages

Week11_1

Week11_1

43 pages

Week7_2

Week7_2

15 pages

Week5_b

Week5_b

19 pages

Week11_a

Week11_a

29 pages

LECT14BW

LECT14BW

24 pages

T7kriegel

T7kriegel

21 pages

0413

0413

2 pages

3

3

23 pages

C2-TSE

C2-TSE

16 pages

10_19_99

10_19_99

12 pages

s1and2-v2

s1and2-v2

37 pages

Week10_3

Week10_3

23 pages

jalal

jalal

6 pages

1

1

25 pages

T3Querys

T3Querys

47 pages

CS17

CS17

15 pages

porkaew

porkaew

20 pages

LECT4BW

LECT4BW

21 pages

Week10_1

Week10_1

25 pages

wavelet

wavelet

17 pages

October5a

October5a

22 pages

p289-korn

p289-korn

12 pages

2

2

33 pages

rose

rose

36 pages

9_7_99

9_7_99

18 pages

Week10_2

Week10_2

28 pages

Week7_3

Week7_3

37 pages

Load more
Download Nima
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Nima and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Nima 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?