We address the problem of authenticating pattern matching queries over textual data that is outsourced to an untrusted cloud server. By employing cryptographic accumulators in a novel optimal integrity-checking tool built directly over a suffix tree, we design the first authenticated data structure for verifiable answers to pattern match-ing queries featuring fast generation of constant-size proofs. We present two main applications of our new construction to authen-ticate: (i) pattern matching queries over text documents, and (ii) exact path queries over XML documents. Answers to queries are verified by proofs of size at most 500 bytes for text pattern match-ing, and at most 243 bytes for exact path XML search, indepen-dently of the documen...
Cloud computing has emerged as an important new computational and storage medium and is increasingly...
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a clie...
The amount of data an average person has, is becoming so huge that in the near future this cannot be...
An integral component of modern computing is the ability to outsource data and computation to powerf...
An increasing number of enterprizes outsource database functionality to third-party service provider...
Executing authenticated computation on outsourced data is currently an area of major interest in cry...
We study the verification of \emph{set operations} in the model of \emph{authenticated data structur...
Abstract. Query answers from on-line databases can easily be corrupted by hackers or malicious datab...
In this paper, we consider a setting where a user wants to outsource storage of a large amount of pr...
Web searching accounts for one of the most frequently performed computations over the Internet as we...
Many real-world applications run on untrusted servers or are run on servers that are subject to stro...
An authenticated data structure (ADS) is a data structure whose operations can be carried out by an ...
Cloud computing and cloud storage are becoming increasingly prevalent. In this paradigm, clients out...
International audienceWe propose a model for data authentication which takes into account the behavi...
Abstract. Authentication is increasingly relevant to data management. Data is being outsourced to un...
Cloud computing has emerged as an important new computational and storage medium and is increasingly...
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a clie...
The amount of data an average person has, is becoming so huge that in the near future this cannot be...
An integral component of modern computing is the ability to outsource data and computation to powerf...
An increasing number of enterprizes outsource database functionality to third-party service provider...
Executing authenticated computation on outsourced data is currently an area of major interest in cry...
We study the verification of \emph{set operations} in the model of \emph{authenticated data structur...
Abstract. Query answers from on-line databases can easily be corrupted by hackers or malicious datab...
In this paper, we consider a setting where a user wants to outsource storage of a large amount of pr...
Web searching accounts for one of the most frequently performed computations over the Internet as we...
Many real-world applications run on untrusted servers or are run on servers that are subject to stro...
An authenticated data structure (ADS) is a data structure whose operations can be carried out by an ...
Cloud computing and cloud storage are becoming increasingly prevalent. In this paradigm, clients out...
International audienceWe propose a model for data authentication which takes into account the behavi...
Abstract. Authentication is increasingly relevant to data management. Data is being outsourced to un...
Cloud computing has emerged as an important new computational and storage medium and is increasingly...
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a clie...
The amount of data an average person has, is becoming so huge that in the near future this cannot be...