Efficient authentication of approximate record matching for outsourced databases

Boxiang Dong, Hui Wendy Wang

Research output: Contribution to journalArticlepeer-review

Abstract

Cloud computing enables the outsourcing of big data analytics, where a third-party server is responsible for data management and processing. A major security concern of the outsourcing paradigm is whether the untrusted server returns correct results. In this paper, we consider approximate record matching in the outsourcing model. Given a target record, the service provider should return all records from the outsourced dataset that are similar to the target. Identifying approximately duplicate records in databases plays an important role in information integration and entity resolution. In this paper, we design ALARM, an Authentication soLution of outsourced Approximate Record Matching to verify the correctness of the result. The key idea of ALARM is that besides returning the similar records, the server constructs the verification object (VO) to prove their authenticity, soundness and completeness. ALARM consists of four authentication approaches, namely V S2, E-V S2, G-V S2 and P-V S2. These approaches endeavor to reduce the verification cost from different aspects. We theoretically prove the robustness and security of these approaches, and analyze the time and space complexity for each approach. We perform an extensive set of experiment on real-world datasets to demonstrate that ALARM can verify the record matching results with cheap cost.

Original languageEnglish
Pages (from-to)119-168
Number of pages50
JournalAdvances in Intelligent Systems and Computing
Volume838
DOIs
StatePublished - 2019

Keywords

  • Approximate record matching
  • Authentication
  • Game theory
  • Outsourcing
  • Verification object

Fingerprint

Dive into the research topics of 'Efficient authentication of approximate record matching for outsourced databases'. Together they form a unique fingerprint.

Cite this