Query Authentication of Outsourced Spatial Database

被引:0
|
作者
Hong, Jun [1 ,2 ]
Wen, Tao [2 ]
Guo, Quan [3 ]
机构
[1] North Univ China, Sch Software, Taiyuan, Peoples R China
[2] Northeastern Univ, Sch Comp Sci & Engn, Shenyang, Peoples R China
[3] Dalian Neusoft Univ Informat, Comp Sci & Technol, Dalian, Peoples R China
关键词
Data Outsourcing; KNN; spatial database; cloud computing; query authentication; ASSURANCE;
D O I
10.34028/iajit/17/4/12
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Outsourcing spatial database to a third party is becoming a common practice for more and more individuals and companies to save the cost of managing and maintaining database, where a data owner delegates its spatial data management tasks to a third party and grants it to provide query services. However, the third party is not full trusted. Thus, authentication information should be provided to the client for query authentication. In this paper, we introduce an efficient space authenticated data structure, called Verifiable Similarity Indexing tree (VSS-tree), to support authenticated spatial query. We build VSS-tree based on SS-tree which employs bounding sphere rather than bounding rectangle for region shape and extend it with authentication information. Based on VSS-tree, the third party finds query results and builds their corresponding verification object. The client performs query authentication using the verification object and the public key published. Finally, we evaluate the performance and validity of our algorithms, the experiment results show that VSS-tree can efficiently support spatial query and have better performance than Merkle R tree (MR-tree).
引用
收藏
页码:539 / 547
页数:9
相关论文
共 50 条
  • [1] Anonymity Query Method of Outsourced Database
    Zhang, Yonghua
    [J]. ADVANCES IN APPLIED SCIENCE AND INDUSTRIAL TECHNOLOGY, PTS 1 AND 2, 2013, 798-799 : 837 - 841
  • [2] ConcurDB: Concurrent Query Authentication for Outsourced Databases
    Bajaj, Sumeet
    Chakraborti, Anrin
    Sion, Radu
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2021, 33 (04) : 1401 - 1412
  • [3] Query Assurance Verification for Outsourced Database
    Liu, Pengtao
    [J]. ADVANCES IN FUTURE COMPUTER AND CONTROL SYSTEMS, VOL 2, 2012, 160 : 39 - 44
  • [4] An Online Query Authentication System for Outsourced Databases
    Zhou, Ying
    Wang, Chen
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 570 - 577
  • [5] Outsourced XML Database: Query Assurance Optimization
    Clarke, Andrew
    Pardede, Eric
    [J]. 2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 1181 - 1188
  • [6] Authentication of outsourced linear function query with efficient updates
    Gang Sheng
    Chunming Tang
    Hongyan Han
    Wei Gao
    Xing Hu
    [J]. Cluster Computing, 2019, 22 : 10031 - 10039
  • [7] Separating Authentication from Query Execution in Outsourced Databases
    Papadopoulos, Stavros
    Papadias, Dimitris
    Cheng, Weiwei
    Tan, Kian-Lee
    [J]. ICDE: 2009 IEEE 25TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2009, : 1148 - +
  • [8] Authentication of outsourced linear function query with efficient updates
    Sheng, Gang
    Tang, Chunming
    Han, Hongyan
    Gao, Wei
    Hu, Xing
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S10031 - S10039
  • [9] Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey
    Zhang, Bo
    Dong, Boxiang
    Wang, Wendy Hui
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2021, 33 (04) : 1601 - 1618
  • [10] Secure and Efficient Nearest Neighbor Query for an Outsourced Database
    Guo, Jingjing
    Sun, Jiacong
    [J]. IEEE ACCESS, 2020, 8 : 83754 - 83764