The Community for Technology Leaders
2008 IEEE 24th International Conference on Data Engineering (2008)
Cancun, Mexico
Apr. 7, 2008 to Apr. 12, 2008
ISBN: 978-1-4244-1836-7
pp: 696-704
Mikhail J. Atallah , Department of Computer Science, Purdue University, West Lafayette, IN 47907. mja@cs.purdue.edu
YounSun Cho , Department of Computer Science, Purdue University, West Lafayette, IN 47907. cho@cs.purdue.edu
Ashish Kundu , Department of Computer Science, Purdue University, West Lafayette, IN 47907. ashishk@cs.purdue.edu
ABSTRACT
In the third-party model for the distribution of data, the trusted data creator or owner provides an untrusted party D with data and integrity verification (IV) items for that data. When a user U gets a subset of the data at D or is already in possession of that subset, U may request from D the IV items that make it possible for U to verify the integrity of its data: D must then provide u with the (hopefully small) number of needed IVs. Most of the published work in this area uses the Merkle tree or variants thereof. For the problem of 2-dimensional range data, the best published solutions require D to store O(n log n) IV items for a database of n items, and allow a user U to be sent only O(log n) of those IVs for the purpose of verifying the integrity of the data it receives from D (regardless of the size of U's query rectangle). For data that is modeled as a 2-dimensional grid (such as GIS or image data), this paper shows that better bounds are possible: The number of IVs stored at D (and the time it takes to compute them) can be brought down to O(n), and the number of IVs sent to U for verification can be brought down to a constant.
INDEX TERMS
CITATION

Y. Cho, M. J. Atallah and A. Kundu, "Efficient Data Authentication in an Environment of Untrusted Third-Party Distributors," 2008 IEEE 24th International Conference on Data Engineering(ICDE), Cancun, Mexico, 2008, pp. 696-704.
doi:10.1109/ICDE.2008.4497478
88 ms
(Ver 3.3 (11022016))