Skip to main content
Log in

A resource-aware approach for authenticating privacy preserving GNN queries

  • Published:
World Wide Web Aims and scope Submit manuscript

Abstract

Nowadays many location service providers (LSPs) employ spatial databases outsourced from a third-party data owner (DO) to answer various users’ queries, e.g., group nearest neighbor (GNN) queries that enable a group of users to find a meeting place minimizing their aggregate travel distance. Along with the benefits from LSPs and DO, protection of location privacy and authentication of query results become two major concerns for users while assessing GNN queries. This paper proposes a resource-aware approach that supports effective location privacy preservation and efficient query result authentication with a less storage, communication and computation overhead. Specifically, two centroid-based techniques are investigated to generate a centroid point, which initiates GNN query on behalf of the group members. Then, an authentication algorithm based on Voronoi diagram is proposed for spatial queries. Finally, we demonstrate how our approach is resistant to various attacks, and evaluate its performance by comparing with three competitive approaches. The results show the proposed approach is better and more economical in terms of resource overhead, while considering both privacy preservation and query authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6

Similar content being viewed by others

Notes

  1. http://chorochronos.datastories.org/?q=node/58

References

  1. Andrés, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-Indistinguishability: differential privacy for location-based systems. In: SIGSAC, pp 901–914 (2013)

  2. Ashouri-Talouki, M., Baraani-Dastjerdi, A., Selçuk, A.A.: GLP: a cryptographic approach for group location privacy. Comput. Commun. 35(12), 1527–1533 (2012)

    Article  Google Scholar 

  3. Ashouri-Talouki, M., Baraani-Dastjerdi, A., Selçuk, A.A.: The cloaked-centroid protocol: location privacy protection for a group of users of location-based services. Knowl. Inf. Syst. 45(3), 589–615 (2015)

    Article  Google Scholar 

  4. Chen, Q., Hu, H., Xu, J.: Authenticating top-k queries in location-based services with confidentiality. PVLDB 7(1), 49–60 (2013)

    Google Scholar 

  5. Fu, Z., Shu, J., Wang, J., Liu, Y., Lee, S.: Privacy-preserving smart similarity search based on simhash over encrypted data in cloud computing. J. Internet Technol. 16(3), 453–460 (2015)

    Google Scholar 

  6. Gedik, B., Liu, L.: Location privacy in mobile systems: a personalized anonymization model. In: ICDCS, pp 620–629 (2005)

  7. Ghinita, G., Kalnis, P., Skiadopoulos, S.: Mobihide: a mobilea peer-to-peer system for anonymous location-based queries. In: SSTD, pp 221–238 (2007)

  8. Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.: Private queries in location based services: anonymizers are not necessary. In: SIGMOD, pp 121–132 (2008)

  9. Hao, F., Zielinski, P.: The power of anonymous veto in public discussion. Trans. Computational Science 4, 41–52 (2009)

    MATH  Google Scholar 

  10. Hashem, T., Kulik, L., Zhang, R.: Privacy Preserving Group Nearest Neighbor Queries. In: EDBT, pp 489–500 (2010)

  11. Hashem, T., Ali, M.E., Kulik, L., Tanin, E., Quattrone, A.: Protecting privacy for group nearest neighbor queries with crowdsourced data and computing. In: Ubicomp, pp 559–562 (2013)

  12. Hashem, T., Datta, S., Islam, T.U., Ali, M.E., Kulik, L., Tanin, E.: A unified framework for authenticating privacy preserving location based services. In: Georich@SIGMOD 2015, pp 13–18 (2015)

  13. Hu, H., Xu, J.: Non-exposure location anonymity. In: ICDE, pp 1120–1131 (2009)

  14. Hu, H., Xu, J., Chen, Q., Yang, Z.: Authenticating location-based services without compromising location privacy. In: SIGMOD, pp 301–312 (2012)

  15. Hu, L., Ku, W., Bakiras, S., Shahabi, C.: Spatial query integrity with voronoi neighbors. IEEE Trans. Knowl. Data Eng. 25(4), 863–876 (2013)

    Article  Google Scholar 

  16. Huang, Y., Vishwanathan, R.: Privacy preserving group nearest neighbour queries in location-based services using cryptographic techniques. In: GLOBECOM, pp 1–5 (2010)

  17. Khan, A.K.M.M.R., Hashem, T., Tanin, E., Kulik, L.: Location Oblivious Privacy Protection for Group Nearest Neighbor Queries. In: GIScience, pp 301–317 (2014)

  18. Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: SSTD, pp 239–257 (2007)

  19. Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: ICPS, pp 88–97 (2005)

  20. Okabe, A., Satoh, T., Furuta, T., Suzuki, A., Okano, K.: Generalized network voronoi diagrams: concepts, computational methods, and applications. Int. J. Geogr. Inf. Sci. 22(9), 965–994 (2008)

    Article  Google Scholar 

  21. Paillier, P., Pointcheval, D.: Efficient public-key cryptosystems provably secure against active adversaries. In: ASIACRYPT, pp 165–179 (1999)

  22. Papadias, D., Shen, Q., Tao, Y., Mouratidis, K.: Group nearest neighbor queries. In: ICDE, pp 301–312 (2004)

  23. Papadopoulos, S., Yang, Y., Bakiras, S., Papadias, D.: Continuous spatial authentication. In: SSTD, pp. 62–79 (2009)

  24. Sadeghi, A., Visconti, I., Wachsmann, C.: Anonymizer-enabled security and privacy for RFID. In: CANS, pp 134–153 (2009)

  25. Sheikh, R., Mishra, D.K., Kumar, B.: Secure multiparty computation: from millionaires problem to anonymizer. Information Security Journal: A Global Perspective 20(1), 25–33 (2011)

    Google Scholar 

  26. Shen, J., Liu, D., Shen, J., Liu, Q., Sun, X.: A secure cloud-assisted urban data sharing framework for ubiquitous-cities. Pervasive Mob. Comput. (2017). https://doi.org/10.1016/j.pmcj.2017.03.013

  27. Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W.: An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. 12(10), 2402–2415 (2017)

    Article  Google Scholar 

  28. Song, J., Shen, H.T., Wang, J., Huang, Z., Sebe, N., Wang, J.: A distance-computation-free search scheme for binary code databases. IEEE Trans Multimedia 18(3), 484–495 (2016)

    Article  Google Scholar 

  29. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowledge Based Syst. 10(5), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  30. Um, J., Kim, Y., Lee, H., Jang, M., Chang, J.: k-nearest neighbor query processing algorithm for cloaking regions towards user privacy protection in location-based services. Journal of Systems Architecture - Embedded Systems Design 58(9), 354–371 (2012)

    Google Scholar 

  31. Xu, S., Yang, W., Lau, F.C.M.: A visualization based approach for digital signature authentication. Comput. Graph. Forum 28(3), 935–942 (2009)

    Article  Google Scholar 

  32. Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Authenticated indexing for outsourced spatial databases. VLDB J. 18(3), 631–648 (2009)

    Article  Google Scholar 

  33. Yiu, M.L., Ghinita, G., Jensen, C.S., Kalnis, P.: Enabling search services on outsourced private spatial data. VLDB J. 19(3), 363–384 (2010)

    Article  Google Scholar 

  34. Zhu, X., Zhang, L., Huang, Z.: A sparse embedding and least variance encoding approach to hashing. IEEE Trans. Image Process. 23(9), 3737–3750 (2014)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (grants No. 61672133, No. 61632007 and No. 61602087), and the Fundamental Research Funds for the Central Universities (grants No. ZYGX2015J058 and No. ZYGX2014Z007).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jie Shao.

Additional information

This article belongs to the Topical Collection: Special Issue on Deep vs. Shallow: Learning for Emerging Web-scale Data Computing and Applications.

Guest Editors: Jingkuan Song, Shuqiang Jiang, Elisa Ricci, and Zi Huang

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dai, Y., Shao, J., Hu, G. et al. A resource-aware approach for authenticating privacy preserving GNN queries. World Wide Web 22, 437–454 (2019). https://doi.org/10.1007/s11280-017-0507-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11280-017-0507-4

Keywords

Navigation