Continuous Spatial Authentication

被引:0
|
作者
Papadopoulos, Stavros [1 ]
Yang, Yin [1 ]
Bakiras, Spiridon [2 ]
Papadias, Dimitris [1 ]
机构
[1] Hong Kong Univ Sci & Technol, Dept Comp Sci & Engn, Hong Kong, Hong Kong, Peoples R China
[2] CUNY, John Jay Coll, Dept Math & Comp Sci, New York, NY USA
来源
ADVANCES IN SPATIAL AND TEMPORAL DATABASES, PROCEEDINGS | 2009年 / 5644卷
关键词
DATABASES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent advances in wireless communications and positioning devices have generated a tremendous amount of interest in the continuous monitoring of spatial queries. However, such applications can incur a heavy burden on the data owner (DO), due to very frequent location updates. Database outsourcing is a viable solution, whereby the DO delegates its database functionality to a service provider (SP) that has the infrastructure and resources to handle the high workload. In this framework, authenticated query processing enables the clients to verify the correctness of the query results that are returned by the SP. In addition to correctness, the dynamic nature of the monitored data requires the provision for temporal completeness, i.e., the clients must be able to verify that there are no missing results in between data updates. This paper constitutes the first work that deals with the authentication of continuous spatial queries, focusing on ranges. We first introduce a baseline solution (BSL) that achieves correctness and temporal completeness, but incurs false transmissions; that is, the SP has to notify clients whenever there is a data update, even if it does not affect their results. Then, we propose CSA, a mechanism that minimizes the processing and transmission overhead through an elaborate indexing scheme and a virtual caching mechanism. Finally, we derive analytical models to optimize the performance of our methods, and evaluate their effectiveness through extensive experiments.
引用
收藏
页码:62 / +
页数:3
相关论文
共 50 条
  • [21] Continuous Authentication Leveraging Matrix Profile
    Ibanez-Lissen, Luis
    de Fuentes, Jose Maria
    Gonzalez-Manzano, Lorena
    Anciaux, Nicolas
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [22] PARTIAL FACE DETECTION FOR CONTINUOUS AUTHENTICATION
    Mahbub, Upal
    Patel, Vishal M.
    Chandra, Deepak
    Barbello, Brandon
    Chellappa, Rama
    2016 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2016, : 2991 - 2995
  • [23] Continuous User Authentication using WiFi
    Huang, Pengcheng
    Zhang, Dongheng
    Geng, Ruixu
    Chen, Yan
    PROCEEDINGS OF 2022 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2022, : 2083 - 2088
  • [24] Continuous Authentication Using Behavioral Biometrics
    Deutschmann, Ingo
    Nordstrom, Peder
    Nilsson, Linus
    IT PROFESSIONAL, 2013, 15 (04) : 12 - 15
  • [25] Known User Continuous Authentication System
    Brosso, Ines
    Ferreira, Fernando
    Bressan, Graca
    Ruggiero, Wilson V.
    2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010, 2010, : 747 - +
  • [26] Continuous Authentication and Authorization for the Internet of Things
    Shahzad, Muhammad
    Singh, Munindar P.
    IEEE INTERNET COMPUTING, 2017, 21 (02) : 86 - 90
  • [27] Silent and Continuous Authentication in Mobile Environment
    Canfora, Gerardo
    di Notte, Paolo
    Mercaldo, Francesco
    Visaggio, Corrado Aaron
    SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4, 2016, : 97 - 108
  • [28] Continuous Authentication using Mouse Dynamics
    Mondal, Soumik
    Bours, Patrick
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE OF THE BIOMETRICS SPECIAL INTEREST GROUP (BIOSIG 2013), 2013,
  • [29] CABA: Continuous Authentication Based on BioAura
    Mosenia, Arsalan
    Sur-Kolay, Susmita
    Raghunathan, Anand
    Jha, Niraj K.
    IEEE TRANSACTIONS ON COMPUTERS, 2017, 66 (05) : 759 - 772
  • [30] Expanding Continuous Authentication with Mobile Devices
    Schaffer, Kim B.
    COMPUTER, 2015, 48 (11) : 92 - 95