The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - April (2013 vol.25)
pp: 863-876
Ling Hu , University of Southern California, Los Angeles
Wei-Shinn Ku , Auburn University, Auburn
Spiridon Bakiras , John Jay College, CUNY, New York
Cyrus Shahabi , University of Southern California, Los Angeles
ABSTRACT
With the popularity of location-based services and the abundant usage of smart phones and GPS-enabled devices, the necessity of outsourcing spatial data has grown rapidly over the past few years. Meanwhile, the fast arising trend of cloud storage and cloud computing services has provided a flexible and cost-effective platform for hosting data from businesses and individuals, further enabling many location-based applications. Nevertheless, in this database outsourcing paradigm, the authentication of the query results at the client remains a challenging problem. In this paper, we focus on the Outsourced Spatial Database (OSDB) model and propose an efficient scheme, called $({VN{\hbox{-}}Auth})$, which allows a client to verify the correctness and completeness of the result set. Our approach is based on neighborhood information derived from the Voronoi diagram of the underlying spatial data set and can handle fundamental spatial query types, such as $(k)$ nearest neighbor and range queries, as well as more advanced query types like reverse $(k)$ nearest neighbor, aggregate nearest neighbor, and spatial skyline. We evaluated VN-Auth based on real-world data sets using mobile devices (Google Droid smart phones with Android OS) as query clients. Compared to the current state-of-the-art approaches (i.e., methods based on Merkle Hash Trees), our experiments show that VN-Auth produces significantly smaller verification objects and is more computationally efficient, especially for queries with low selectivity.
INDEX TERMS
Spatial databases, Authentication, Query processing, Outsourcing, Aggregates, Indexes, spatial queries, Spatial database outsourcing, location-based services, query authentication
CITATION
Ling Hu, Wei-Shinn Ku, Spiridon Bakiras, Cyrus Shahabi, "Spatial Query Integrity with Voronoi Neighbors", IEEE Transactions on Knowledge & Data Engineering, vol.25, no. 4, pp. 863-876, April 2013, doi:10.1109/TKDE.2011.267
REFERENCES
[1] M. Bellare and A. Palacio, "GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation Under Active and Concurrent Attacks," CRYPTO: Proc. 22nd Ann. Int'l Cryptology Conf. Advances in Cryptology, pp. 162-177, 2002.
[2] D. Boneh, B. Lynn, and H. Shacham, "Short Signatures from the Weil Pairing," J. Cryptology, vol. 17, no. 4, pp. 297-319, 2004.
[3] W. Cheng, H. Pang, and K.-L. Tan, "Authenticating Multi-dimensional Query Results in Data Publishing," Proc. 20th IFIP WG 11.3 Working Conf. Data and Applications Security (DBSec), pp. 60-73, 2006.
[4] W. Cheng and K.-L. Tan, "Authenticating $k{\rm NN}$ Query Results in Data Publishing," Proc. Fourth VLDB Conf. Secure Data Management, pp. 47-63, 2007.
[5] W. Cheng and K.-L. Tan, "Query Assurance Verification for Outsourced Multi-Dimensional Databases," J. Computer Security, vol. 17, no. 1, pp. 101-126, 2009.
[6] A. Fiat, "Batch RSA," J. Cryptology, vol. 10, no. 2, pp. 75-88, 1997.
[7] A. Guttman, "R-Trees: A Dynamic Index Structure for Spatial Searching," Proc. ACM SIGMOD Int'l Conf. Management of Data,, pp. 47-57, 1984.
[8] H. Hacigümüs, B.R. Iyer, C. Li, and S. Mehrotra, "Executing SQL over Encrypted Data in the Database-service-provider Model," Proc. ACM SIGMOD Int'l Conf. Management of Data,, pp. 216-227, 2002.
[9] H. Hacigümüs, S. Mehrotra, and B.R. Iyer, "Providing Database as a Service," Proc. Int'l Conf. Data Eng. (ICDE), pp. 29-38, 2002.
[10] L. Hu, W.-S. Ku, S. Bakiras, and C. Shahabi, "Verifying Spatial Queries Using Voronoi Neighbors," Proc. 18th SIGSPATIAL Int'l Conf. Advances in Geographic Information Systems , pp. 350-359, 2010.
[11] Java SE Security, http://java.sun.com/javase/technologies security , 2012.
[12] M.R. Kolahdouzan and C. Shahabi, "Voronoi-Based K Nearest Neighbor Search for Spatial Network Databases," Proc. 30th Int'l Conf. Very Large Data Bases (VLDB), pp. 840-851, 2004.
[13] W.-S. Ku, L. Hu, C. Shahabi, and H. Wang, "Query Integrity Assurance of Location-Based Services Accessing Outsourced Spatial Databases," Proc. 11th Int'l Symp. Advances in Spatial and Temporal Databases (SSTD), pp. 80-97, 2009.
[14] F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin, "Dynamic Authenticated Index Structures for Outsourced Databases," Proc. ACM SIGMOD Int'l Conf. Management of Data,, pp. 121-132, 2006.
[15] X. Lin, J. Xu, and H. Hu, "Authentication of Location-Based Skyline Queries," Proc. 20th ACM Int'l Conf. Information and Knowledge Management (CIKM), pp. 1583-1588, 2011.
[16] K. Mouratidis, D. Sacharidis, and H. Pang, "Partially Materialized Digest Scheme: An Efficient Verification Method for Outsourced Databases," VLDB J., vol. 18, no. 1, pp. 363-381, 2009.
[17] E. Mykletun, M. Narasimha, and G. Tsudik, "Authentication and Integrity in Outsourced Databases," Proc. Symp. Network and Distributed Systems Security (NDSS), 2004.
[18] E. Mykletun, M. Narasimha, and G. Tsudik, "Signature Bouquets: Immutability for Aggregated/Condensed Signatures," Proc. European Symp. Research in Computer Security (ESORICS), pp. 160-176, 2004.
[19] E. Mykletun, M. Narasimha, and G. Tsudik, "Authentication and Integrity in Outsourced Databases," Trans. Storage, vol. 2, no. 2, pp. 107-138, 2006.
[20] A. Okabe, B. Boots, K. Sugihara, and S.N. Chiu, "Spatial Tessellations: Concepts and Applications of Voronoi Diagrams," Probability and Statistics, second ed., Wiley, 2000.
[21] H. Pang, A. Jain, K. Ramamritham, and K.-L. Tan, "Verifying Completeness of Relational Query Results in Data Publishing," Proc. ACM SIGMOD Int'l Conf. Management of Data,, pp. 407-418, 2005.
[22] H. Pang and K.-L. Tan, "Authenticating Query Results in Edge Computing," Proc. 20th Int'l Conf. Data Eng. (ICDE), pp. 560-571, 2004.
[23] H. Pang, J. Zhang, and K. Mouratidis, "Scalable Verification for Outsourced Dynamic Databases," Proc. VLDB Endowment, vol. 2, no. 1, pp. 802-813, 2009.
[24] D. Papadias, Y. Tao, G. Fu, and B. Seeger, "Progressive Skyline Computation in Database Systems," ACM Trans. Database Systems, vol. 30, no. 1, pp. 41-82, 2005.
[25] D. Papadias, Y. Tao, K. Mouratidis, and C.K. Hui, "Aggregate Nearest Neighbor Queries in Spatial Databases," ACM Trans. Database Systems, vol. 30, no. 2, pp. 529-576, 2005.
[26] S. Papadopoulos, Y. Yang, S. Bakiras, and D. Papadias, "Continuous Spatial Authentication," Proc. 11th Int'l Symp. Advances in Spatial and Temporal Databases (SSTD), pp. 62-79, 2009.
[27] M. Sharifzadeh and C. Shahabi, "VoR-Tree: Incorporating Voronoi Diagrams into R-Trees for I/O-Efficient Processing of Spatial Nearest Neighbor Queries," Proc. VLDB Endowment, vol. 3, no. 1-2, pp. 1231-1242, 2010.
[28] M. Sharifzadeh, C. Shahabi, and L. Kazemi, "Processing Spatial Skyline Queries in Both Vector Spaces and Spatial Network Databases," ACM Trans. Database Systems, vol. 34, no. 3,article 14, 2009.
[29] R. Sion, "Query Execution Assurance for Outsourced Databases," Proc. 31st Int'l Conf. Very Large Data Bases (VLDB), pp. 601-612, 2005.
[30] Y. Tao, D. Papadias, and X. Lian, "Reverse $k{\rm NN}$ Search in Arbitrary Dimensionality," Proc. 30th Int'l Conf. Very Large Data Bases (VLDB), pp. 744-755, 2004.
[31] US Census Bureau, http://www.census.gov/geo/wwwtiger/, 2012.
[32] H. Wang, J. Yin, C.-S. Perng, and P.S. Yu, "Dual Encryption for Query Integrity Assurance," Proc. 17th ACM Conf. Information and Knowledge Management (CIKM), pp. 863-872, 2008.
[33] M. Xie, H. Wang, J. Yin, and X. Meng, "Integrity Auditing of Outsourced Data," Proc. 33rd Int'l Conf. Very Large Data Bases (VLDB), pp. 782-793, 2007.
[34] Y. Yang, S. Papadopoulos, D. Papadias, and G. Kollios, "Spatial Outsourcing for Location-Based Services," Proc. IEEE 24th Int'l Conf. Data Eng. (ICDE), pp. 1082-1091, 2008.
[35] Y. Yang, S. Papadopoulos, D. Papadias, and G. Kollios, "Authenticated Indexing for Outsourced Spatial Databases," VLDB J., vol. 18, no. 3, pp. 631-648, 2009.
[36] M.L. Yiu, E. Lo, and D. Yang, "Authentication of Moving kNN Queries," Proc. IEEE 27th Int'l Conf. Data Eng. (ICDE), 2011.
29 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool