Open Access. Powered by Scholars. Published by Universities.®

Medicine and Health Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Life Sciences

Purdue University

Series

Authentication

Articles 1 - 1 of 1

Full-Text Articles in Medicine and Health Sciences

Authenticated Top-K Aggregation In Distributed And Authenticated Top-K Aggregation In Distributed And, Sunoh Choi, Hyo-Sang Lim, Elisa Bertino Jan 2012

Authenticated Top-K Aggregation In Distributed And Authenticated Top-K Aggregation In Distributed And, Sunoh Choi, Hyo-Sang Lim, Elisa Bertino

Cyber Center Publications

Top-k queries have attracted interest in many different areas like network and system monitoring, information retrieval, sensor networks, and so on. Since today many applications issue top-k queries on distributed and outsourced databases,
authentication of top-k query results becomes more important. This paper addresses the problem of authenticated top-k aggregation queries (e.g. “find the k objects with the highest aggregate values”) in a distributed system. We propose a new algorithm, called Authenticated Three Phase Uniform Threshold (A-TPUT), which provides not only efficient top-k aggregation over distributed databases but also authentication on the top-k results. We also introduce several enhancements for …