The Community for Technology Leaders
2009 IEEE 25th International Conference on Data Engineering (2009)
Mar. 29, 2009 to Apr. 2, 2009
ISSN: 1084-4627
ISBN: 978-0-7695-3545-6
pp: 1140-1143
Social networking and content sharing service providers, e.g., Facebook and Google Maps, enable their users to upload and share a variety of user-generated content, including location data such as points of interest. Users wish to share location data through an (untrusted) service provider such that trusted friends can perform spatial queries on the data. We solve the problem by transforming the location data before uploading them. We contribute spatial transformations that re-distribute locations in space and a transformation that employs cryptographic techniques. The data owner selects transformation keys and shares them with the trusted friends. Without the keys, it is infeasible for an attacker to reconstruct the exact original data points from the transformed points. These transformations achieve different tradeoffs between query efficiency and data security. In addition, we describe an attack model for studying the security properties of the transformations. Empirical studies suggest that the proposed methods are secure and efficient.

G. Ghinita, M. L. Yiu, P. Kalnis and C. S. Jensen, "Outsourcing Search Services on Private Spatial Data," 2009 IEEE 25th International Conference on Data Engineering(ICDE), vol. 00, no. , pp. 1140-1143, 2009.
87 ms
(Ver 3.3 (11022016))