Continuous Spatial Authentication

被引:0
|
作者
Papadopoulos, Stavros [1 ]
Yang, Yin [1 ]
Bakiras, Spiridon [2 ]
Papadias, Dimitris [1 ]
机构
[1] Hong Kong Univ Sci & Technol, Dept Comp Sci & Engn, Hong Kong, Hong Kong, Peoples R China
[2] CUNY, John Jay Coll, Dept Math & Comp Sci, New York, NY USA
关键词
DATABASES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent advances in wireless communications and positioning devices have generated a tremendous amount of interest in the continuous monitoring of spatial queries. However, such applications can incur a heavy burden on the data owner (DO), due to very frequent location updates. Database outsourcing is a viable solution, whereby the DO delegates its database functionality to a service provider (SP) that has the infrastructure and resources to handle the high workload. In this framework, authenticated query processing enables the clients to verify the correctness of the query results that are returned by the SP. In addition to correctness, the dynamic nature of the monitored data requires the provision for temporal completeness, i.e., the clients must be able to verify that there are no missing results in between data updates. This paper constitutes the first work that deals with the authentication of continuous spatial queries, focusing on ranges. We first introduce a baseline solution (BSL) that achieves correctness and temporal completeness, but incurs false transmissions; that is, the SP has to notify clients whenever there is a data update, even if it does not affect their results. Then, we propose CSA, a mechanism that minimizes the processing and transmission overhead through an elaborate indexing scheme and a virtual caching mechanism. Finally, we derive analytical models to optimize the performance of our methods, and evaluate their effectiveness through extensive experiments.
引用
收藏
页码:62 / +
页数:3
相关论文
共 50 条
  • [31] CDAS: A Continuous Dynamic Authentication System
    Li, Qi
    Chen, Hao
    2019 8TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA 2019), 2019, : 447 - 452
  • [32] Continuous Authentication against Collusion Attacks
    Lyu, Pin
    Cai, Wandong
    Wang, Yao
    SENSORS, 2022, 22 (13)
  • [33] Leveraging Breathing for Continuous User Authentication
    Liu, Jian
    Dong, Yudi
    Chen, Yingying
    Wang, Yan
    Zhao, Tianming
    MOBICOM'18: PROCEEDINGS OF THE 24TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2018, : 786 - 788
  • [34] Touchpad Input for Continuous Biometric Authentication
    Chan, Alexander
    Halevi, Tzipora
    Memon, Nasir
    COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2014, 2014, 8735 : 86 - 91
  • [35] Physical Layer Authentication in Spatial Modulation
    Xu, Yuntao
    Zhang, Jiaheng
    Zhang, Qihong
    Zhang, Peichang
    Huang, Lei
    Xie, Ning
    Lu, Jian
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2023, 71 (05) : 2947 - 2962
  • [36] Query Authentication of Outsourced Spatial Database
    Hong, Jun
    Wen, Tao
    Guo, Quan
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2020, 17 (04) : 539 - 547
  • [37] Spatial watermark for image content authentication
    Queluz, MP
    JOURNAL OF ELECTRONIC IMAGING, 2002, 11 (02) : 275 - 285
  • [38] Continuous User Authentication on Multiple Smart Devices
    Wang, Yajie
    Zhang, Xiaomei
    Hu, Haomin
    INFORMATION, 2023, 14 (05)
  • [39] Soft Biometric Traits for Continuous User Authentication
    Niinuma, Koichiro
    Park, Unsang
    Jain, Anil K.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (04) : 771 - 780
  • [40] Security, Privacy, and Usability in Continuous Authentication: A Survey
    Baig, Ahmed Fraz
    Eskeland, Sigurd
    SENSORS, 2021, 21 (17)