Query-efficient Partitions for Dynamic Data

被引:2
|
作者
Vasilakis, Nikos [1 ]
Palkhiwala, Yash [1 ]
Smith, Jonathan M. [1 ]
机构
[1] Univ Penn, 3330 Walnut St, Philadelphia, PA 19104 USA
基金
美国国家科学基金会;
关键词
Key-Value Store; Dynamic; NoSQL; Partitioning; Queries;
D O I
10.1145/3124680.3124744
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Large-scale data storage requirements have led to the development of distributed, non-relational databases (NoSQL). Single-dimension NoSQL achieves scalability by partitioning data over a single key space. Queries on primary ("key") properties are made efficient at the cost of queries on other properties. Multidimensional NoSQL systems attempt to remedy this inefficiency by creating multiple key spaces. Unfortunately, the structure of data needs to be known a priori and must remain fixed, eliminating many of the original benefits of NoSQL. This paper presents three techniques that together enable query-efficient partitioning of dynamic data. First, unispace hashing (UH) extends multidimensional hashing to data of unknown structure with the goal of improving queries on secondary properties. Second, compression formulas leverage user insight to address UH's inefficiencies and further accelerate lookups by certain properties. Third, formula spaces use UH to simplify compression formulas and accelerate queries on the structure of objects. The resulting system supports dynamic data similar to single-dimension NoSQL systems, efficient data queries on secondary properties, and novel intersection, union, and negation queries on the structure of dynamic data.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] LIGHT: A Query-Efficient Yet Low-Maintenance Indexing Scheme over DHTs
    Tang, Yuzhe
    Zhou, Shuigeng
    Xu, Jianliang
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2010, 22 (01) : 59 - 75
  • [42] Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks
    Yan, Ziang
    Guo, Yiwen
    Zhang, Changshui
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 32 (NIPS 2019), 2019, 32
  • [43] MGAAttack: Toward More Query-efficient Black-box Attack by Microbial Genetic Algorithm
    Wang, Lina
    Yang, Kang
    Wang, Wenqi
    Wang, Run
    Ye, Aoshuang
    MM '20: PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, 2020, : 2229 - 2236
  • [44] Cube-Evo: A Query-Efficient Black-Box Attack on Video Classification System
    Zhan, Yu
    Fu, Ying
    Huang, Liang
    Guo, Jianmin
    Shi, Heyuan
    Song, Houbing
    Hu, Chao
    IEEE TRANSACTIONS ON RELIABILITY, 2024, 73 (02) : 1160 - 1171
  • [45] DifAttack: Query-Efficient Black-Box Adversarial Attack via Disentangled Feature Space
    Liu, Jun
    Zhou, Jiantao
    Zeng, Jiandian
    Tian, Jinyu
    THIRTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 4, 2024, : 3666 - 3674
  • [46] Poster: Query-efficient Black-box Attack for Image Forgery Localization via Reinforcement Learning
    Mo, Xianbo
    Tan, Shunquan
    Li, Bin
    Huang, Jiwu
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3552 - 3554
  • [47] Transferable adversarial distribution learning: Query-efficient adversarial attack against large language models
    Dong, Huoyuan
    Dong, Jialiang
    Wan, Shaohua
    Yuan, Shuai
    Guan, Zhitao
    COMPUTERS & SECURITY, 2023, 135
  • [48] Query-Efficient Hard-Label Black-Box Attacks Using Biased Sampling
    Liu, Sijia
    Sun, Jian
    Li, Jun
    2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, : 3872 - 3877
  • [49] Query-Efficient Black-Box Adversarial Attacks Guided by a Transfer-Based Prior
    Dong, Yinpeng
    Cheng, Shuyu
    Pang, Tianyu
    Su, Hang
    Zhu, Jun
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2022, 44 (12) : 9536 - 9548
  • [50] Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers
    Rosenberg, Ishai
    Shabtai, Asaf
    Elovici, Yuval
    Rokach, Lior
    36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), 2020, : 611 - 626