Query-efficient Partitions for Dynamic Data

被引:2
|
作者
Vasilakis, Nikos [1 ]
Palkhiwala, Yash [1 ]
Smith, Jonathan M. [1 ]
机构
[1] Univ Penn, 3330 Walnut St, Philadelphia, PA 19104 USA
基金
美国国家科学基金会;
关键词
Key-Value Store; Dynamic; NoSQL; Partitioning; Queries;
D O I
10.1145/3124680.3124744
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Large-scale data storage requirements have led to the development of distributed, non-relational databases (NoSQL). Single-dimension NoSQL achieves scalability by partitioning data over a single key space. Queries on primary ("key") properties are made efficient at the cost of queries on other properties. Multidimensional NoSQL systems attempt to remedy this inefficiency by creating multiple key spaces. Unfortunately, the structure of data needs to be known a priori and must remain fixed, eliminating many of the original benefits of NoSQL. This paper presents three techniques that together enable query-efficient partitioning of dynamic data. First, unispace hashing (UH) extends multidimensional hashing to data of unknown structure with the goal of improving queries on secondary properties. Second, compression formulas leverage user insight to address UH's inefficiencies and further accelerate lookups by certain properties. Third, formula spaces use UH to simplify compression formulas and accelerate queries on the structure of objects. The resulting system supports dynamic data similar to single-dimension NoSQL systems, efficient data queries on secondary properties, and novel intersection, union, and negation queries on the structure of dynamic data.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] TextCheater: A Query-Efficient Textual Adversarial Attack in the Hard-Label Setting
    Peng, Hao
    Guo, Shixin
    Zhao, Dandan
    Zhang, Xuhong
    Han, Jianmin
    Ji, Shouling
    Yang, Xing
    Zhong, Ming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3901 - 3916
  • [32] GenDroid: A query-efficient black-box android adversarial attack framework
    Xu, Guangquan
    Shao, Hongfei
    Cui, Jingyi
    Bai, Hongpeng
    Li, Jiliang
    Bai, Guangdong
    Liu, Shaoying
    Meng, Weizhi
    Zheng, Xi
    COMPUTERS & SECURITY, 2023, 132
  • [33] Query-Efficient Black-Box Adversarial Attacks on Automatic Speech Recognition
    Tong, Chuxuan
    Zheng, Xi
    Li, Jianhua
    Ma, Xingjun
    Gao, Longxiang
    Xiang, Yong
    IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2023, 31 : 3981 - 3992
  • [34] Query-Efficient Black-Box Red Teaming via Bayesian Optimization
    Lee, Deokjae
    Lee, JunYeong
    Ha, Jung-Woo
    Kim, Jin-Hwa
    Lee, Sang-Woo
    Lee, Hwaran
    Song, Hyun Oh
    PROCEEDINGS OF THE 61ST ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (ACL 2023): LONG PAPERS, VOL 1, 2023, : 11551 - 11574
  • [35] Simulating Unknown Target Models for Query-Efficient Black-box Attacks
    Ma, Chen
    Chen, Li
    Yong, Jun-Hai
    2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, CVPR 2021, 2021, : 11830 - 11839
  • [36] QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval
    Li, Xiaodan
    Li, Jinfeng
    Chen, Yuefeng
    Ye, Shaokai
    He, Yuan
    Wang, Shuhui
    Su, Hang
    Xue, Hui
    2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, CVPR 2021, 2021, : 3329 - 3338
  • [37] Query-efficient decision-based attack via sampling distribution reshaping
    Sun, Xuxiang
    Cheng, Gong
    Pei, Lei
    Han, Junwei
    PATTERN RECOGNITION, 2022, 129
  • [38] BounceAttack: A Query-Efficient Decision-based Adversarial Attack by Bouncing into the Wild
    Wan, Jie
    Fu, Jianhao
    Wang, Lijin
    Yang, Ziqi
    45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 1270 - 1286
  • [39] Query-Efficient Black-Box Adversarial Attack With Customized Iteration and Sampling
    Shi, Yucheng
    Han, Yahong
    Hu, Qinghua
    Yang, Yi
    Tian, Qi
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 45 (02) : 2226 - 2245
  • [40] Towards Query-efficient Black-box Adversarial Attack on Text Classification Models
    Yadollahi, Mohammad Mehdi
    Lashkari, Arash Habibi
    Ghorbani, Ali A.
    2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,