Authenticating Aggregate Queries over Set-Valued Data with Confidentiality (Extended Abstract). Xu, C., Chen, Q., Hu, H., Xu, J., & Hei, X. In Proceedings of the 34th IEEE International Conference on Data Engineering (\textbfICDE '18), pages 1797–1798, Paris, France, 4, 2018.
Paper doi abstract bibtex With recent advances in data-as-a-service (DaaS) and cloud computing, aggregate query services over set-valued data are becoming widely available for business intelligence that drives decision making. However, as the service provider is often a third-party delegate of the data owner, the integrity of the query results cannot be guaranteed and is thus imperative to be authenticated. Unfortunately, existing query authentication techniques either do not work for set-valued data or they lack data confidentiality. In this paper, we propose authenticated aggregate queries over set-valued data that not only ensure the integrity of query results but also preserve the confidentiality of source data.
@inproceedings{ICDE18:auth-aggregate-queries,
author = {Xu, Cheng
and Chen, Qian
and Hu, Haibo
and Xu, Jianliang
and Hei, Xiaojun},
author+an = {1=highlight},
title = {Authenticating Aggregate Queries over Set-Valued Data with Confidentiality (Extended Abstract)},
booktitle = {Proceedings of the 34th IEEE International Conference on Data Engineering (\textbf{ICDE '18})},
year = {2018},
month = {4},
address = {Paris, France},
pages = {1797--1798},
issn = {2375-026X},
doi = {10.1109/ICDE.2018.00256},
url = {https://doi.org/10.1109/ICDE.2018.00256},
eprint_url = {https://xuc.me/file/paper/ICDE18.pdf},
poster_url = {https://xuc.me/file/poster/TKDE18.pdf},
addendum = {Poster Paper},
abstract = {With recent advances in data-as-a-service (DaaS) and cloud computing, aggregate query services over set-valued data are becoming widely available for business intelligence that drives decision making. However, as the service provider is often a third-party delegate of the data owner, the integrity of the query results cannot be guaranteed and is thus imperative to be authenticated. Unfortunately, existing query authentication techniques either do not work for set-valued data or they lack data confidentiality. In this paper, we propose authenticated aggregate queries over set-valued data that not only ensure the integrity of query results but also preserve the confidentiality of source data.},
}
Downloads: 0
{"_id":"XDAxgyisnJvhCZkju","bibbaseid":"xu-chen-hu-xu-hei-authenticatingaggregatequeriesoversetvalueddatawithconfidentialityextendedabstract-2018","authorIDs":[],"author_short":["Xu, C.","Chen, Q.","Hu, H.","Xu, J.","Hei, X."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"propositions":[],"lastnames":["Xu"],"firstnames":["Cheng"],"suffixes":[]},{"propositions":[],"lastnames":["Chen"],"firstnames":["Qian"],"suffixes":[]},{"propositions":[],"lastnames":["Hu"],"firstnames":["Haibo"],"suffixes":[]},{"propositions":[],"lastnames":["Xu"],"firstnames":["Jianliang"],"suffixes":[]},{"propositions":[],"lastnames":["Hei"],"firstnames":["Xiaojun"],"suffixes":[]}],"author+an":"1=highlight","title":"Authenticating Aggregate Queries over Set-Valued Data with Confidentiality (Extended Abstract)","booktitle":"Proceedings of the 34th IEEE International Conference on Data Engineering (\\textbfICDE '18)","year":"2018","month":"4","address":"Paris, France","pages":"1797–1798","issn":"2375-026X","doi":"10.1109/ICDE.2018.00256","url":"https://doi.org/10.1109/ICDE.2018.00256","eprint_url":"https://xuc.me/file/paper/ICDE18.pdf","poster_url":"https://xuc.me/file/poster/TKDE18.pdf","addendum":"Poster Paper","abstract":"With recent advances in data-as-a-service (DaaS) and cloud computing, aggregate query services over set-valued data are becoming widely available for business intelligence that drives decision making. However, as the service provider is often a third-party delegate of the data owner, the integrity of the query results cannot be guaranteed and is thus imperative to be authenticated. Unfortunately, existing query authentication techniques either do not work for set-valued data or they lack data confidentiality. In this paper, we propose authenticated aggregate queries over set-valued data that not only ensure the integrity of query results but also preserve the confidentiality of source data.","bibtex":"@inproceedings{ICDE18:auth-aggregate-queries,\n author = {Xu, Cheng\n and Chen, Qian\n and Hu, Haibo\n and Xu, Jianliang\n and Hei, Xiaojun},\n author+an = {1=highlight},\n title = {Authenticating Aggregate Queries over Set-Valued Data with Confidentiality (Extended Abstract)},\n booktitle = {Proceedings of the 34th IEEE International Conference on Data Engineering (\\textbf{ICDE '18})},\n year = {2018},\n month = {4},\n address = {Paris, France},\n pages = {1797--1798},\n issn = {2375-026X},\n doi = {10.1109/ICDE.2018.00256},\n url = {https://doi.org/10.1109/ICDE.2018.00256},\n eprint_url = {https://xuc.me/file/paper/ICDE18.pdf},\n poster_url = {https://xuc.me/file/poster/TKDE18.pdf},\n addendum = {Poster Paper},\n abstract = {With recent advances in data-as-a-service (DaaS) and cloud computing, aggregate query services over set-valued data are becoming widely available for business intelligence that drives decision making. However, as the service provider is often a third-party delegate of the data owner, the integrity of the query results cannot be guaranteed and is thus imperative to be authenticated. Unfortunately, existing query authentication techniques either do not work for set-valued data or they lack data confidentiality. In this paper, we propose authenticated aggregate queries over set-valued data that not only ensure the integrity of query results but also preserve the confidentiality of source data.},\n}\n\n","author_short":["Xu, C.","Chen, Q.","Hu, H.","Xu, J.","Hei, X."],"key":"ICDE18:auth-aggregate-queries","id":"ICDE18:auth-aggregate-queries","bibbaseid":"xu-chen-hu-xu-hei-authenticatingaggregatequeriesoversetvalueddatawithconfidentialityextendedabstract-2018","role":"author","urls":{"Paper":"https://doi.org/10.1109/ICDE.2018.00256"},"downloads":0},"bibtype":"inproceedings","biburl":"https://raw.githubusercontent.com/xu-cheng/cv/master/publications.bib","creationDate":"2020-06-12T06:21:50.713Z","downloads":0,"keywords":[],"search_terms":["authenticating","aggregate","queries","over","set","valued","data","confidentiality","extended","abstract","xu","chen","hu","xu","hei"],"title":"Authenticating Aggregate Queries over Set-Valued Data with Confidentiality (Extended Abstract)","year":2018,"dataSources":["JqXgh8gtQb9p7ev5t"]}