Abstract

With the development in the application environment of database management system, the related technologies such as data management and data access have become more and more complex and the cost of maintenance has been more and more expensive. The problems that how to enable enterprises to focus on the ir expert areas and outsource the unfamiliar enterprise information systems to others , thus to save a lot of resources but receive the same quality of service s, are widely concerned by the database research and application areas. Database as a service (DAS), which means that enterprises outsource the database system to some database service providers (DSP) who manage the massive data and provide high-quality data management service becomes an important application in nowadays . To enjoy services provided by a third party, we need to ensure the correctness and completeness of query results. This paper pospose an algorithm which provides an authentication method for the query results returned from a possible malicous server on which database is outsourced and query is evaluated. The basic idea is to build some Merkle hash trees twice to verify the correctness and completeness of the query results. We have demonstrated the effectiveness of our method in experiments.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call