Abstract
GPS location and simple notification services are becoming more advanced. This advancement enhances spatial keyword search, including content locations and textual descriptions. Cloud users may read the news and watch social media and movies while going outside. Cloud Service Provider (CSP) can handle a wide range of spatial web objects gathered from various sources for saving local computation and storage resources. However, one major issue is that the malicious CSP may provide erroneous query results due to cost concerns, accidents or a hacker attack. The current authentication techniques for the continuous moving object are cumbersome and inadequate for our scenario. We need to check the search results on the user side and verify the query results’ correctness and soundness. This paper addresses authenticating those dynamic objects’ spatialkeyword searches, whose keywords and locations vary over time. This query benefits several location-aware services, including e-commerce, potential consumer tracking, self-driving stores, and cloud technologies. MIR-tree and MIR*-tree are two novel queries authenticating data structures with low computing and transmission costs. To aid in verifying query results, we provide a verification object and propose ways to generate it. Based on a detailed experimental analysis of real data, our suggested strategies outperform.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Chen, L., Cong, G., Cao, X., Tan, K.L.: Temporal spatial-keyword top-k publish/subscribe. In: 2015 IEEE 31st International Conference on Data Engineering, pp. 255–266. IEEE (2015)
Chen, L., Cong, G., Jensen, C.S., Wu, D.: Spatial keyword query processing: an experimental evaluation. Proc. VLDB Endow. 6(3), 217–228 (2013). https://doi.org/10.14778/2535569.2448955
Cong, G., Jensen, C.S., Wu, D.: Efficient retrieval of the top-k most relevant spatial web objects. Proc. VLDB Endow. 2(1), 337–348 (2009)
De Felipe, I., Hristidis, V., Rishe, N.: Keyword search on spatial databases. In: 2008 IEEE 24th International Conference on Data Engineering, pp. 656–665. IEEE (2008)
Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.G.: Authentic data publication over the internet 1. J. Comput. Secur. 11(3), 291–314 (2003)
Dong, Y., et al.: Continuous top-k spatial-keyword search on dynamic objects. VLDB J. 30(2), 141–161 (2021)
Guo, L., Shao, J., Aung, H.H., Tan, K.L.: Efficient continuous top-k spatial keyword queries on road networks. GeoInformatica 19(1), 29–60 (2015)
Huang, W., Li, G., Tan, K.L., Feng, J.: Efficient safe-region construction for moving top-k spatial keyword queries. In: Proceedings of the 21st ACM International Conference on Information and Knowledge Management, pp. 932–941 (2012)
Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, pp. 121–132 (2006)
Mahmood, A., Aref, W.G.: Query processing techniques for big spatial-keyword data. In: Proceedings of the 2017 ACM International Conference on Management of Data, pp. 1777–1782 (2017)
Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, New York (1990). https://doi.org/10.1007/0-387-34805-0_21
Mouratidis, K., Bakiras, S., Papadias, D.: Continuous monitoring of top-k queries over sliding windows. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, pp. 635–646 (2006)
Mouratidis, K., Papadias, D., Hadjieleftheriou, M.: Conceptual partitioning: an efficient method for continuous nearest neighbor monitoring. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 634–645 (2005)
Okabe, A., Boots, B., Sugihara, K., Chiu, S.N.: Spatial Tessellations: Concepts and Applications of Voronoi Diagrams, vol. 501. Wiley, New York (2009)
Pang, H., Jain, A., Ramamritham, K., Tan, K.L.: Verifying completeness of relational query results in data publishing. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 407–418 (2005)
Pang, H., Mouratidis, K.: Authenticating the query results of text search engines. Proc. VLDB Endow. 1(1), 126–137 (2008)
Pang, H., Tan, K.L.: Authenticating query results in edge computing. In: Proceedings of the 20th International Conference on Data Engineering, pp. 560–571. IEEE (2004)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Wei, J., Tian, G., Shen, J., Chen, X., Susilo, W.: Optimal verifiable data streaming protocol with data auditing. In: Bertino, E., Shulman, H., Waidner, M. (eds.) ESORICS 2021. LNCS, vol. 12973, pp. 296–312. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-88428-4_15
Wu, D., Choi, B., Xu, J., Jensen, C.S.: Authentication of moving top-k spatial keyword queries. IEEE Trans. Knowl. Data Eng. 27(4), 922–935 (2014)
Wu, D., Cong, G., Jensen, C.S.: A framework for efficient spatial web object retrieval. VLDB J. 21(6), 797–822 (2012)
Wu, D., Yiu, M.L., Cong, G., Jensen, C.S.: Joint top-k spatial keyword query processing. IEEE Trans. Knowl. Data Eng. 24(10), 1889–1903 (2011)
Wu, D., Yiu, M.L., Jensen, C.S.: Moving spatial keyword queries: Formulation, methods, and analysis. ACM Trans. Database Syst. (TODS) 38(1), 1–47 (2013)
Xiong, X., Mokbel, M.F., Aref, W.G.: SEA-CNN: scalable processing of continuous k-nearest neighbor queries in spatio-temporal databases. In: 21st International Conference on Data Engineering (ICDE 2005), pp. 643–654. IEEE (2005)
Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Authenticated indexing for outsourced spatial databases. VLDB J. 18(3), 631–648 (2009)
Yao, B., Li, F., Xiao, X.: Secure nearest neighbor revisited. In: 2013 IEEE 29th International Conference on Data Engineering (ICDE), pp. 733–744. IEEE (2013)
Yetneberk, Z.: A survey on spatial keyword search over encrypted data. In: Xiong, J., Wu, S., Peng, C., Tian, Y. (eds.) MobiMedia 2021. LNICST, vol. 394, pp. 413–431. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-89814-4_30
Yiu, M.L., Lin, Y., Mouratidis, K.: Efficient verification of shortest path search via authenticated hints. In: 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010), pp. 237–248. IEEE (2010)
Yiu, M.L., Lo, E., Yung, D.: Authentication of moving kNN queries. In: 2011 IEEE 27th International Conference on Data Engineering, pp. 565–576. IEEE (2011)
Yu, X., Pu, K.Q., Koudas, N.: Monitoring k-nearest neighbor queries over moving objects. In: 21st International Conference on Data Engineering (ICDE 2005), pp. 631–642. IEEE (2005)
Yung, D., Lo, E., Yiu, M.L.: Authentication of moving range queries. In: Proceedings of the 21st ACM International Conference on Information and Knowledge Management, pp. 1372–1381 (2012)
Zheng, B., et al.: Keyword-aware continuous kNN query on road networks. In: 2016 IEEE 32nd International Conference on Data Engineering (ICDE), pp. 871–882. IEEE (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Melesew, Y.Z., Li, J., Miao, Y. (2022). Authenticated Continuous Top-k Spatial Keyword Search on Dynamic Objects. In: Chen, X., Huang, X., Kutyłowski, M. (eds) Security and Privacy in Social Networks and Big Data. SocialSec 2022. Communications in Computer and Information Science, vol 1663. Springer, Singapore. https://doi.org/10.1007/978-981-19-7242-3_3
Download citation
DOI: https://doi.org/10.1007/978-981-19-7242-3_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-7241-6
Online ISBN: 978-981-19-7242-3
eBook Packages: Computer ScienceComputer Science (R0)