ABSTRACT
With the popularity of location-based services and the abundant usage of smart phones and GPS enabled devices, the necessity of outsourcing spatial data has grown rapidly over the past few years. Nevertheless, in the database outsourcing paradigm, the authentication of the query results at the client remains a challenging problem. In this paper, we focus on the Outsourced Spatial Database (OSDB) model and propose an efficient scheme, called VN-Auth, that allows a client to verify the correctness and completeness of the result set. Our approach can handle both k nearest neighbor (kNN) and range queries, and is based on neighborhood information derived by the Voronoi diagram of the underlying spatial dataset. Specifically, upon receiving a query result, the client can verify its integrity by examining the signatures and exploring the neighborhood of every object in the result set. Compared to the current state-of-the-art approaches (i.e., methods based on Merkle hash trees), VN-Auth produces significantly smaller verification objects (VO) and is more computationally efficient, especially for queries with low selectivity.
- D. Boneh, B. Lynn, and H. Shacham. Short Signatures from the Weil Pairing. J. Cryptology, 17(4):297--319, 2004. Google ScholarDigital Library
- W. Cheng, H. Pang, and K.-L. Tan. Authenticating Multi-dimensional Query Results in Data Publishing. In DBSec, pages 60--73, 2006. Google ScholarDigital Library
- W. Cheng and K.-L. Tan. Authenticating kNN Query Results in Data Publishing. In Secure Data Management, pages 47--63, 2007. Google ScholarDigital Library
- W. Cheng and K.-L. Tan. Query assurance verification for outsourced multi-dimensional databases. Journal of Computer Security, 17(1):101--126, 2009. Google ScholarDigital Library
- A. Fiat. Batch RSA. J. Cryptology, 10(2):75--88, 1997.Google ScholarDigital Library
- A. Guttman. R-Trees: A Dynamic Index Structure for Spatial Searching. In SIGMOD Conference, pages 47--57, 1984. Google ScholarDigital Library
- H. Hacigümüs, B. R. Iyer, C. Li, and S. Mehrotra. Executing SQL over Encrypted Data in the Database-service-provider Model. In SIGMOD Conference, pages 216--227, 2002. Google ScholarDigital Library
- H. Hacigümüs, S. Mehrotra, and B. R. Iyer. Providing Database as a Service. In ICDE, page 29, 2002. Google ScholarDigital Library
- G. R. Hjaltason and H. Samet. Distance Browsing in Spatial Databases. ACM Trans. Database Syst., 24(2):265--318, 1999. Google ScholarDigital Library
- Java SE Security. http://java.sun.com/javase/technologies/security.Google Scholar
- M. R. Kolahdouzan and C. Shahabi. Voronoi-Based K Nearest Neighbor Search for Spatial Network Databases. In VLDB, pages 840--851, 2004. Google ScholarDigital Library
- W.-S. Ku, L. Hu, C. Shahabi, and H. Wang. Query integrity assurance of location-based services accessing outsourced spatial databases. In SSTD, pages 80--97, 2009. Google ScholarDigital Library
- F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin. Dynamic Authenticated Index Structures for Outsourced Databases. In SIGMOD Conference, pages 121--132, 2006. Google ScholarDigital Library
- K. Mouratidis, D. Sacharidis, and H. Pang. Partially Materialized Digest Scheme: An Efficient Verification Method for Outsourced Databases. VLDB J., 18(1):363--381, 2009. Google ScholarDigital Library
- E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and Integrity in Outsourced Databases. In NDSS, 2004.Google Scholar
- E. Mykletun, M. Narasimha, and G. Tsudik. Signature Bouquets: Immutability for Aggregated/Condensed Signatures. In ESORICS, pages 160--176, 2004.Google ScholarCross Ref
- E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and Integrity in Outsourced Databases. TOS, 2(2):107--138, 2006. Google ScholarDigital Library
- A. Okabe, B. Boots, K. Sugihara, and S. N. Chiu. Spatial Tessellations: Concepts and Applications of Voronoi Diagrams. Probability and Statistics. Wiley, NYC, 2nd edition, 2000. Google ScholarDigital Library
- H. Pang, A. Jain, K. Ramamritham, and K.-L. Tan. Verifying Completeness of Relational Query Results in Data Publishing. In SIGMOD Conference, pages 407--418, 2005. Google ScholarDigital Library
- H. Pang and K.-L. Tan. Authenticating Query Results in Edge Computing. In ICDE, pages 560--571, 2004. Google ScholarDigital Library
- H. Pang, J. Zhang, and K. Mouratidis. Scalable Verification for Outsourced Dynamic Databases. PVLDB, 2(1):802--813, 2009. Google ScholarDigital Library
- S. Papadopoulos, Y. Yang, S. Bakiras, and D. Papadias. Continuous Spatial Authentication. In SSTD, pages 62--79, 2009. Google ScholarDigital Library
- N. Roussopoulos, S. Kelley, and F. Vincent. Nearest Neighbor Queries. In SIGMOD Conference, pages 71--79, 1995. Google ScholarDigital Library
- M. Sharifzadeh and C. Shahabi. VoR-tree: R-trees with Voronoi Diagrams for Efficient Processing of Spatial Nearest Neighbor Queries. PVLDB, 3(1), 2010. Google ScholarDigital Library
- R. Sion. Query Execution Assurance for Outsourced Databases. In VLDB, pages 601--612, 2005. Google ScholarDigital Library
- U.S. Census Bureau. http://www.census.gov/geo/www/tiger/.Google Scholar
- H. Wang, J. Yin, C.-S. Perng, and P. S. Yu. Dual Encryption for Query Integrity Assurance. In CIKM, pages 863--872, 2008. Google ScholarDigital Library
- M. Xie, H. Wang, J. Yin, and X. Meng. Integrity Auditing of Outsourced Data. In VLDB, pages 782--793, 2007. Google ScholarDigital Library
- Y. Yang, S. Papadopoulos, D. Papadias, and G. Kollios. Spatial Outsourcing for Location-based Services. In ICDE, pages 1082--1091, 2008. Google ScholarDigital Library
- Y. Yang, S. Papadopoulos, D. Papadias, and G. Kollios. Authenticated Indexing for Outsourced Spatial Databases. VLDB J., 18(3):631--648, 2009. Google ScholarDigital Library
Index Terms
- Verifying spatial queries using Voronoi neighbors
Recommendations
Spatial Query Integrity with Voronoi Neighbors
With the popularity of location-based services and the abundant usage of smart phones and GPS-enabled devices, the necessity of outsourcing spatial data has grown rapidly over the past few years. Meanwhile, the fast arising trend of cloud storage and ...
Enforcing k nearest neighbor query integrity on road networks
SIGSPATIAL '12: Proceedings of the 20th International Conference on Advances in Geographic Information SystemsOutsourcing spatial databases, including both road networks and points of interest, to a third party Cloud service provider has attracted much attention from individual and business data owners. With popularity of mobile devices, providing instant and ...
Reverse k nearest neighbors queries and spatial reverse top-k queries
Given a set of facilities and a set of users, a reverse k nearest neighbors (RkNN) query q returns every user for which the query facility is one of the k closest facilities. Almost all of the existing techniques to answer RkNN queries adopt a pruning-...
Comments