Title :
Light-Weight, Runtime Verification of Query Sources
Author :
Ge, Tingjian ; Zdonik, Stan
Author_Institution :
Comput. Sci. Dept., Brown Univ., Providence, RI
fDate :
March 29 2009-April 2 2009
Abstract :
Modern database systems increasingly make use of networked storage. This storage can be in the form of SAN´s or in the form of shared-nothing nodes in a cluster. One type of attack on databases is arbitrary modification of data in a database through the file system, bypassing database access control. Additionally, for many applications, ensuring strict and definite authenticity of query source and results is required or highly desirable. In this paper, we propose a lightweight approach for verifying the minimum information that a database server needs from the storage system to execute a query. The verification is definite and produces high confidence results because of its online manner (i.e., the information is verified right before it is used). It is lightweight in three ways: (1) We use the Merkle hash tree data structure and fast cryptographic hash functions to ensure the verification itself is fast and secure; (2) We verify the minimum number of bytes needed to ensure the authenticity of the source related to the query result; and (3) We achieve high concurrency of multiple reader and writer transactions and avoid delays due to locking by using the compare-and-swap primitive. We then prove the correctness and progress guarantees of the algorithms using concepts from the theory of distributed computing. We also analyze the performance of the algorithm. Finally, we perform a comprehensive empirical study on various parameter choices and on the system performance and concurrency with our approaches.
Keywords :
cryptography; query processing; tree data structures; Merkle hash tree data structure; arbitrary modification; cryptographic hash functions; database access control; file system; query sources; runtime verification; Access control; Concurrent computing; Cryptography; Database systems; Delay; Distributed computing; File systems; Performance analysis; Runtime; Tree data structures; algorithms; security; verification;
Conference_Titel :
Data Engineering, 2009. ICDE '09. IEEE 25th International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-1-4244-3422-0
Electronic_ISBN :
1084-4627
DOI :
10.1109/ICDE.2009.40