학술논문

veffChain: Enabling Freshness Authentication of Rich Queries Over Blockchain Databases
Document Type
Periodical
Source
IEEE Transactions on Knowledge and Data Engineering IEEE Trans. Knowl. Data Eng. Knowledge and Data Engineering, IEEE Transactions on. 36(5):2285-2300 May, 2024
Subject
Computing and Processing
Blockchains
Databases
Authentication
Search problems
Medical services
Threat modeling
Scalability
Blockchain
++%24K%24<%2Ftex-math>+<%2Finline-formula>+++K<%2Fmml%3Ami>+<%2Fmml%3Amath>++<%2Falternatives>+<%2Fnamed-content>+queries%22">latest- $K$ K queries
fuzzy matches
verifiability
Language
ISSN
1041-4347
1558-2191
2326-3865
Abstract
With the wide adoption of blockchains in data-intensive applications, enabling verifiable queries over a blockchain database is urgently required. Aiming at reducing costs, previous solutions embed a small-sized authenticated data structure (ADS) in each block header, so that a user can verify search results without maintaining a full copy of blockchain databases. However, existing studies focus on exact queries with difficulty to guarantee the freshness of search results. In this article, we propose two frameworks, called $\mathsf{veffChain}$veffChain and $\mathsf{veffChain++}$veffChain++, to realize freshness authentication of rich queries over blockchain databases. Specifically, $\mathsf{veffChain}$veffChain concerns about verifiable latest-$K$K exact queries and employs RSA accumulator to generate constant-size ADSs; $\mathsf{veffChain++}$veffChain++ integrates RSA accumulator into the Trie tree to further authenticate latest-$K$K fuzzy queries. For improved scalability, an adaptive keyword splitting (AKS) solution is proposed to enable ADSs to be incrementally updated. Compared with the state-of-the-art work, our frameworks have the following merits: (1) Freshness Guarantee . The user can efficiently retrieve the freshest data from a blockchain database in a verifiable way. (2) Flexibility . The user can specify different query patterns on demand to retrieve data as accurately as possible. The detailed security analysis and extensive experiments validate the practicality of our frameworks.