Efficient Authentication of Approximate Record Matching for Outsourced Databases

Document Type

Article

Publication Date

1-1-2019

Journal / Book Title

International Conference on Information Reuse and Integration

Abstract

Cloud computing enables the outsourcing of big data analytics, where a third-party server is responsible for data management and processing. A major security concern of the outsourcing paradigm is whether the untrusted server returns correct results. In this paper, we consider approximate record matching in the outsourcing model. Given a target record, the service provider should return all records from the outsourced dataset that are similar to the target. Identifying approximately duplicate records in databases plays an important role in information integration and entity resolution. In this paper, we design ALARM, an Authentication soLution of outsourced Approximate Record Matching to verify the correctness of the result. The key idea of ALARM is that besides returning the similar records, the server constructs the verification object (VO) to prove their authenticity, soundness and completeness. ALARM consists of four authentication approaches, namely V S 2 , E-V S 2 , G-V S 2 and P-V S 2 . These approaches endeavor to reduce the verification cost from different aspects. We theoretically prove the robustness and security of these approaches, and analyze the time and space complexity for each approach. We perform an extensive set of experiment on real-world datasets to demonstrate that ALARM can verify the record matching results with cheap cost.

DOI

10.1007/978-3-319-98056-0_6

Published Citation

Dong, B., & Wang, H. W. (2017, August). Efficient Authentication of Approximate Record Matching for Outsourced Databases. In International Conference on Information Reuse and Integration (pp. 119-168). Springer, Cham.

Share

COinS