The Community for Technology Leaders
2011 IEEE 27th International Conference on Data Engineering (2011)
Hannover, Germany
Apr. 11, 2011 to Apr. 16, 2011
ISBN: 978-1-4244-8959-6
pp: 565-576
Man Lung Yiu , Department of Computing, Hong Kong Polytechnic University, Hong Kong
Eric Lo , Department of Computing, Hong Kong Polytechnic University, Hong Kong
Duncan Yung , Department of Computing, Hong Kong Polytechnic University, Hong Kong
ABSTRACT
A moving kNN query continuously reports the k nearest neighbors of a moving query point. In addition to the query result, a service provider that evaluates moving queries often returns mobile clients a safe region that bounds the validity of query results to minimize the communication cost between the two parties. However, when a service provider is not trustworthy, it may send inaccurate query results or incorrect safe regions to clients. In this paper, we present a framework and algorithms to authenticate results and safe regions of moving kNN queries. Extensive experiments on both real and synthetic datasets show that our methods are efficient in terms of both computation time and communication costs.
INDEX TERMS
CITATION

M. L. Yiu, E. Lo and D. Yung, "Authentication of moving kNN queries," 2011 IEEE 27th International Conference on Data Engineering(ICDE), Hannover, Germany, 2011, pp. 565-576.
doi:10.1109/ICDE.2011.5767829
87 ms
(Ver 3.3 (11022016))