skip to main content
10.1145/2882903.2915234acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
research-article

Range-based Obstructed Nearest Neighbor Queries

Published:26 June 2016Publication History

ABSTRACT

In this paper, we study a novel variant of obstructed nearest neighbor queries, namely, range-based obstructed nearest neighbor (RONN) search. A natural generalization of continuous obstructed nearest-neighbor (CONN), an RONN query retrieves the obstructed nearest neighbor for every point in a specified range. To process RONN, we first propose a CONN-Based (CONNB) algorithm as our baseline, which reduces the RONN query into a range query and four CONN queries processed using an R-tree. To address the shortcomings of the CONNB algorithm, we then propose a new RONN by R-tree Filtering (RONN-RF) algorithm, which explores effective filtering, also using R-tree. Next, we propose a new index, called O-tree, dedicated for indexing objects in the obstructed space. The novelty of O-tree lies in the idea of dividing the obstructed space into non-obstructed subspaces, aiming to efficiently retrieve highly qualified candidates for RONN processing. We develop an O-tree construction algorithm and propose a space division scheme, called optimal obstacle balance (OOB) scheme, to address the tree balance problem. Accordingly, we propose an efficient algorithm, called RONN by O-tree Acceleration (RONN-OA), which exploits O-tree to accelerate query processing of RONN. In addition, we extend O-tree for indexing polygons. At last, we conduct a comprehensive performance evaluation using both real and synthetic datasets to validate our ideas and the proposed algorithms. The experimental result shows that the RONN-OA algorithm outperforms the two R-tree based algorithms significantly. Moreover, we show that the OOB scheme achieves the best tree balance in O-tree and outperforms two baseline schemes.

References

  1. J. Bao, C.-Y. Chow, M. F. Mokbel, and W.-S. Ku. Efficient evaluation of k-range nearest neighbor queries in road networks. MDM, pages 115--124, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. N. Beckmann, H.-P. Kriegel, R. Schneider, and B. Seeger. The R*-tree: An efficient and robust access method for points and rectangles. SIGMOD, pages 322--331, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. N. Chan and T. Dang. On efficient processing of complicated cloaked region for location privacy aware nearest-neighbor queries. International Conference on Information Communication Technology, pages 101--110, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. de Berg, M. van Kreveld, M. Overmars, and O.Schwarzkopf. Computational Geometry: Algorithms and Applications, Second Edition. Springer-Verlag, Reading, Massachusetts, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. P. Galdames and Y. Cai. Efficient processing of location-cloaked queries. IEEE INFOCOM, 131(5):2480--2488, 2012.Google ScholarGoogle Scholar
  6. Y. Gao and B. Zheng. Continuous obstructed nearest neighbor queries in spatial databases. SIGMOD, pages 577--558, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Y. Gao, B. Zheng, W.-C. Lee, and G. Chen. Continuous visible nearest neighbor queries. EDBT 09, pages 144--155, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. B. Gedik and L. Liu. A customizable k-anonymity model for protecting location privacy. Distributed Computing Systems (ICDCS), pages 763--774, 2005.Google ScholarGoogle Scholar
  9. M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. ACM MobiSys, pages 763--774, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. H. Hu and D. L. Lee. Range nearest-neighbor query. TKDE, 18(1):78--91, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. C. H. J and J. R. Efficient processing of moving k-range nearest neighbor queries in directed and dynamic spatial networks. Mobile Information Systems, 2016.Google ScholarGoogle Scholar
  12. P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preventing location based identity inference in anonymous spatial queries. TKDE, 26(3):1719--1733, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Khoshgozaran, C. Shahabi, and H. Shirani-Mehr. Enabling location privacy; moving beyond k-anonymity, cloaking and anonymizers. Knowledge Information Systems, 26(3):435--465, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. H.-I. Kim and J.-W. Chang. k-nearest neighbor query processing algorithms for a query region in road networks. Journal of Computer Science and Technology, 28(4):585--596, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  15. E. Lee, H. Cho, T. Chung, and K. Ryu. Moving range k nearest neighbor queries with quality guarantee over uncertain moving objects. Information Sciences, 325:324--341, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. X. Lin, J. Xu, and H. Hu. Range-based skyline queries in mobile environments. TKDE, 25(4):835--849, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. F. Mokbel, C. Y. Chow, and W. G. Aref. The New Casper: Query processing for location services without compromising privacy. VLDB, pages 763--774, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. K. Mouratidis, M. Yiu, D. Papadias, and N. Mamoulis. Continuous nearest neighbor monitoring in road networks. VLDB, pages 43--54, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. Nutanong, E. Tanin, and R. Zhang. Visible nearest neighbor queries. DASFAA, pages 876--883, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Y. Tao, D. Papadias, and Q. Shen. Continuous nearest neighbor search. VLDB, pages 287--298, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. K. Tung, J. Hou, and J. Han. Spatial clustering in the presence of obstacles. ICDE, pages 322--331, 1990.Google ScholarGoogle Scholar
  22. X. Wang and H. J. Hamilton. Clustering spatial data in the presence of obstacles. International Journal on Artificial Intelligence Tools, 14(1--2):177--198, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  23. C. Xia, D. Hsu, and H. Tung. A fast filter for obstructed nearest neighbor queries. BNCOD, pages 203--215, November 2004.Google ScholarGoogle ScholarCross RefCross Ref
  24. C. Zhang and Y. Huang. Cloaking locations for anonymous location based services: a hybrid approach. Geoinformatica, pages 159--182, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. J. Zhanga, D. Papadias, K. Mouratidis, and M. Zhu. Spatial queries in the presence of obstacles. EDBT, pages 366--384, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  26. B. Zheng, W.-C. Lee, and D. L. Lee. On searching continuous k nearest neighbors in wireless data broadcast systems. IEEE Transactions on Mobile Computing, 6(7):748--761, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. H. Zhu, J. Wang, B. Wang, and X. Yang. Location privacy preserving obstructed nearest neighbor queries. Journal of Computer Research and Development, 51(1):115--125, 2014.Google ScholarGoogle Scholar

Index Terms

  1. Range-based Obstructed Nearest Neighbor Queries

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SIGMOD '16: Proceedings of the 2016 International Conference on Management of Data
        June 2016
        2300 pages
        ISBN:9781450335317
        DOI:10.1145/2882903

        Copyright © 2016 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 26 June 2016

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate785of4,003submissions,20%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader