skip to main content
10.1145/1869790.1869839acmconferencesArticle/Chapter ViewAbstractPublication PagesgisConference Proceedingsconference-collections
research-article

Verifying spatial queries using Voronoi neighbors

Published:02 November 2010Publication History

ABSTRACT

With the popularity of location-based services and the abundant usage of smart phones and GPS enabled devices, the necessity of outsourcing spatial data has grown rapidly over the past few years. Nevertheless, in the database outsourcing paradigm, the authentication of the query results at the client remains a challenging problem. In this paper, we focus on the Outsourced Spatial Database (OSDB) model and propose an efficient scheme, called VN-Auth, that allows a client to verify the correctness and completeness of the result set. Our approach can handle both k nearest neighbor (kNN) and range queries, and is based on neighborhood information derived by the Voronoi diagram of the underlying spatial dataset. Specifically, upon receiving a query result, the client can verify its integrity by examining the signatures and exploring the neighborhood of every object in the result set. Compared to the current state-of-the-art approaches (i.e., methods based on Merkle hash trees), VN-Auth produces significantly smaller verification objects (VO) and is more computationally efficient, especially for queries with low selectivity.

References

  1. D. Boneh, B. Lynn, and H. Shacham. Short Signatures from the Weil Pairing. J. Cryptology, 17(4):297--319, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. W. Cheng, H. Pang, and K.-L. Tan. Authenticating Multi-dimensional Query Results in Data Publishing. In DBSec, pages 60--73, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. W. Cheng and K.-L. Tan. Authenticating kNN Query Results in Data Publishing. In Secure Data Management, pages 47--63, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. W. Cheng and K.-L. Tan. Query assurance verification for outsourced multi-dimensional databases. Journal of Computer Security, 17(1):101--126, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Fiat. Batch RSA. J. Cryptology, 10(2):75--88, 1997.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. Guttman. R-Trees: A Dynamic Index Structure for Spatial Searching. In SIGMOD Conference, pages 47--57, 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. H. Hacigümüs, B. R. Iyer, C. Li, and S. Mehrotra. Executing SQL over Encrypted Data in the Database-service-provider Model. In SIGMOD Conference, pages 216--227, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. H. Hacigümüs, S. Mehrotra, and B. R. Iyer. Providing Database as a Service. In ICDE, page 29, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. G. R. Hjaltason and H. Samet. Distance Browsing in Spatial Databases. ACM Trans. Database Syst., 24(2):265--318, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Java SE Security. http://java.sun.com/javase/technologies/security.Google ScholarGoogle Scholar
  11. M. R. Kolahdouzan and C. Shahabi. Voronoi-Based K Nearest Neighbor Search for Spatial Network Databases. In VLDB, pages 840--851, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. W.-S. Ku, L. Hu, C. Shahabi, and H. Wang. Query integrity assurance of location-based services accessing outsourced spatial databases. In SSTD, pages 80--97, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin. Dynamic Authenticated Index Structures for Outsourced Databases. In SIGMOD Conference, pages 121--132, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. K. Mouratidis, D. Sacharidis, and H. Pang. Partially Materialized Digest Scheme: An Efficient Verification Method for Outsourced Databases. VLDB J., 18(1):363--381, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and Integrity in Outsourced Databases. In NDSS, 2004.Google ScholarGoogle Scholar
  16. E. Mykletun, M. Narasimha, and G. Tsudik. Signature Bouquets: Immutability for Aggregated/Condensed Signatures. In ESORICS, pages 160--176, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  17. E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and Integrity in Outsourced Databases. TOS, 2(2):107--138, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Okabe, B. Boots, K. Sugihara, and S. N. Chiu. Spatial Tessellations: Concepts and Applications of Voronoi Diagrams. Probability and Statistics. Wiley, NYC, 2nd edition, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. H. Pang, A. Jain, K. Ramamritham, and K.-L. Tan. Verifying Completeness of Relational Query Results in Data Publishing. In SIGMOD Conference, pages 407--418, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. H. Pang and K.-L. Tan. Authenticating Query Results in Edge Computing. In ICDE, pages 560--571, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. H. Pang, J. Zhang, and K. Mouratidis. Scalable Verification for Outsourced Dynamic Databases. PVLDB, 2(1):802--813, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. S. Papadopoulos, Y. Yang, S. Bakiras, and D. Papadias. Continuous Spatial Authentication. In SSTD, pages 62--79, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. N. Roussopoulos, S. Kelley, and F. Vincent. Nearest Neighbor Queries. In SIGMOD Conference, pages 71--79, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. M. Sharifzadeh and C. Shahabi. VoR-tree: R-trees with Voronoi Diagrams for Efficient Processing of Spatial Nearest Neighbor Queries. PVLDB, 3(1), 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. R. Sion. Query Execution Assurance for Outsourced Databases. In VLDB, pages 601--612, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. U.S. Census Bureau. http://www.census.gov/geo/www/tiger/.Google ScholarGoogle Scholar
  27. H. Wang, J. Yin, C.-S. Perng, and P. S. Yu. Dual Encryption for Query Integrity Assurance. In CIKM, pages 863--872, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. M. Xie, H. Wang, J. Yin, and X. Meng. Integrity Auditing of Outsourced Data. In VLDB, pages 782--793, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Y. Yang, S. Papadopoulos, D. Papadias, and G. Kollios. Spatial Outsourcing for Location-based Services. In ICDE, pages 1082--1091, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Y. Yang, S. Papadopoulos, D. Papadias, and G. Kollios. Authenticated Indexing for Outsourced Spatial Databases. VLDB J., 18(3):631--648, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Verifying spatial queries using Voronoi neighbors

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        GIS '10: Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems
        November 2010
        566 pages
        ISBN:9781450304283
        DOI:10.1145/1869790

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 2 November 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate220of1,116submissions,20%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader