Abstract
In outsourced spatial databases, the LBS provides query services to the clients on behalf of the data owner. However, the LBS provider is not always trustworthy and it may send incomplete or incorrect query results to the clients. Therefore, ensuring spatial query integrity is critical. In this paper, we propose efficient RkNN query verification techniques which utilize the influence zone to check the integrity of query results. The methods in this work aim to verify both monochromatic and bichromatic RkNN queries results. Specifically, our methods can gain efficient performance on verifying bichromatic RkNN query results. Extensive experiments on both real and synthetic datasets demonstrate the efficiency of our proposed authenticating methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Cheema, M.A., Lin, X., Zhang, W., Zhang, Y.: Influence zone: efficiently processing reverse k nearest neighbors queries. In: 2011 IEEE 27th International Conference on Data Engineering (ICDE), pp. 577–588. IEEE (2011)
Cheema, M.A., Lin, X., Zhang, Y., Wang, W., Zhang, W.: Lazy updates: An efficient technique to continuously monitoring reverse knn. Proceedings of the VLDB Endowment 2(1), 1138–1149 (2009)
Chen, Q., Hu, H., Xu, J.: Authenticating top-k queries in location-based services with confidentiality. Proc. of the VLDB Endowment 7(1), 49–60 (2014)
Hu, L., Ku, W.S., Bakiras, S., Shahabi, C.: Spatial query integrity with voronoi neighbors. IEEE Transactions on Knowledge and Data Engineering 25(4), 863–876 (2013)
Jing, Y., Hu, L., Ku, W.S., Shahabi, C.: Authentication of k nearest neighbor query on road networks. IEEE Transactions on Knowledge and Data Engineering 26(6), 1494–1506 (2014)
Korn, F., Muthukrishnan, S.: Influence sets based on reverse nearest neighbor queries. In: ACM SIGMOD Record, vol. 29, pp. 201–212. ACM (2000)
Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, pp. 121–132. ACM (2006)
Lin, X., Xu, J., Hu, H., Lee, W.C.: Authenticating location-based skyline queries in arbitrary subspaces. IEEE Transactions on Knowledge and Data Engineering 26(6), 1479–1493 (2014)
Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)
Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. ACM Transactions on Storage (TOS) 2(2), 107–138 (2006)
Tao, Y., Papadias, D., Lian, X.: Reverse knn search in arbitrary dimensionality. In: Proceedings of the Thirtieth International Conference on Very Large Data Bases, vol. 30, pp. 744–755. VLDB Endowment (2004)
Wu, D., Choi, B., Xu, J., Jensen, C.: Authentication of Moving Top-k Spatial Keyword Queries (to appear) (2014)
Wu, W., Yang, F., Chan, C.Y., Tan, K.L.: Continuous reverse k-nearest-neighbor monitoring. In: 9th International Conference on Mobile Data Management, MDM 2008, pp. 132–139. IEEE (2008)
Wu, W., Yang, F., Chan, C.Y., Tan, K.L.: Finch: Evaluating reverse k-nearest-neighbor queries on location data. Proceedings of the VLDB Endowment 1(1), 1056–1067 (2008)
Xie, M., Wang, H., Yin, J., Meng, X.: Integrity auditing of outsourced data. In: Proceedings of the 33rd International Conference on Very Large Data Bases, pp. 782–793. VLDB Endowment (2007)
Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Spatial outsourcing for location-based services. In: IEEE 24th International Conference on Data Engineering, ICDE 2008, pp. 1082–1091. IEEE (2008)
Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Authenticated indexing for outsourced spatial databases. The VLDB Journal, The International Journal on Very Large Data Bases 18(3), 631–648 (2009)
Yiu, M.L., Lo, E., Yung, D.: Authentication of moving knn queries. In: 2011 IEEE 27th International Conference on Data Engineering (ICDE), pp. 565–576. IEEE (2011)
Yung, D., Lo, E., Yiu, M.L.: Authentication of moving range queries. In: Proceedings of the 21st ACM International Conference on Information and Knowledge Management, pp. 1372–1381. ACM (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Li, G., Luo, C., Li, J. (2015). Authentication of Reverse k Nearest Neighbor Query. In: Renz, M., Shahabi, C., Zhou, X., Cheema, M. (eds) Database Systems for Advanced Applications. DASFAA 2015. Lecture Notes in Computer Science(), vol 9049. Springer, Cham. https://doi.org/10.1007/978-3-319-18120-2_36
Download citation
DOI: https://doi.org/10.1007/978-3-319-18120-2_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18119-6
Online ISBN: 978-3-319-18120-2
eBook Packages: Computer ScienceComputer Science (R0)