Authentic Publication The TRUTHSAYER Project. Chip Martel Premkumar Devanbu Michael Gertz April Kwong Glen Nuckolls Stuart Stubblebine Department of Computer Science, University of California, Davis http://truthsayer.cs.ucdavis.edu. Databases Play a Vital Role.
Department of Computer Science,
University of California, Davis
1) May not want/be able to answer queries
2) Hard to keep online DB secure
Can ITrustThis Server?
Protocol is correct, and secure.
Recall: No signatures!!
h(x,y)= z in a correct VO (x,y, z are the hash values of tree nodes),
VO uses different x’, y’ with h(x’,y’)=z
A Y-tree for each internal node2-Dimensional range tree
This Models a wide range of structures
D(s) = h(ds, D(a), D(b), D(c))
So know data ds is OK.
(using D(b) from line 1)
P. Devanbu, M. Gertz, C. Martel, and S.
G. Stubblebine. Authentic Third Party
Data Publication, 14th IFIP 11.3 Working Conf. in DB Security (DBSec 2000),
Original Authentic Publication Paper
A General Model for Authenticated Data Structures, Algorithmica, 2004
Many Data Structures and Search DAG ( above group and G. Nuckolls)
Certifying Data from Multiple Sources, Proceedings of the 17th Database Security Conference, 2003
Shows how to use multiple Owners
Flexible authentication of XML documents, Journal Computer Security, 2004
Li, Hadjieleftheriou, Kollios, Reyzin
Authenticated Index Structures for Outsourced Databases(Overview of area and efficiency issues)
R. Sion: Towards Secure Data Outsourcing
Both in: Michael Gertz and Sushil Jajodia (eds.): "Handbook of Database Security: Applications and Trends", Springer, 2007, to appear.
Persistent Authenticated Dictionaries and Their Applications (allows queries of prior DB versions)
Authenticated Data Structures for Graph and Geometric Searching (fancy geometric data structures)