A query integrity assurance scheme for accessing outsourced spatial databases

被引:27
|
作者
Ku, Wei-Shinn [1 ]
Hu, Ling [2 ]
Shahabi, Cyrus [2 ]
Wang, Haixun [3 ]
机构
[1] Auburn Univ, Dept Comp Sci & Software Engn, Auburn, AL 36849 USA
[2] Univ So Calif, Dept Comp Sci, Los Angeles, CA 90089 USA
[3] Microsoft Res Asia, Beijing Sigma Ctr, Beijing 100190, Peoples R China
基金
美国国家科学基金会;
关键词
Outsourcing; Privacy; Query integrity; Spatial databases; LOCATION; SERVICES;
D O I
10.1007/s10707-012-0156-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the trend of cloud computing, outsourcing databases to third party service providers is becoming a common practice for data owners to decrease the cost of managing and maintaining databases in-house. In conjunction, due to the popularity of location-based-services (LBS), the need for spatial data (e.g., gazetteers, vector data) is increasing dramatically. Consequently, there is a noticeably new tendency of outsourcing spatial datasets by data collectors. Two main challenges with outsourcing datasets are to keep the data private (from the data provider) and to ensure the integrity of the query result (for the clients). Unfortunately, most of the techniques proposed for privacy and integrity do not extend to spatial data in a straightforward manner. Hence, recent studies proposed various techniques to support either privacy or integrity (but not both) on spatial datasets. In this paper, for the first time, we propose a technique that can ensure both privacy and integrity for outsourced spatial data. In particular, we first use a one-way spatial transformation method based on Hilbert curves, which encrypts the spatial data before outsourcing and, hence, ensures its privacy. Next, by probabilistically replicating a portion of the data and encrypting it with a different encryption key, we devise a technique for the client to audit the trustworthiness of the query results. We show the applicability of our approach for both k-nearest-neighbor queries and spatial range queries, which are the building blocks of any LBS application. We also design solutions to guarantee the freshness of outsourced spatial databases. Finally, we evaluate the validity and performance of our algorithms with security analyses and extensive simulations.
引用
收藏
页码:97 / 124
页数:28
相关论文
共 50 条
  • [1] A query integrity assurance scheme for accessing outsourced spatial databases
    Wei-Shinn Ku
    Ling Hu
    Cyrus Shahabi
    Haixun Wang
    [J]. GeoInformatica, 2013, 17 : 97 - 124
  • [2] Query Integrity Assurance of Location-Based Services Accessing Outsourced Spatial Databases
    Ku, Wei-Shinn
    Hu, Ling
    Shahabi, Cyrus
    Wang, Haixun
    [J]. ADVANCES IN SPATIAL AND TEMPORAL DATABASES, PROCEEDINGS, 2009, 5644 : 80 - +
  • [3] A spatial transformation scheme supporting data privacy and query integrity for security of outsourced databases
    Kim, Hyeong-Il
    Hossain, Al-Amin
    Chang, Jae-Woo
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (10) : 1498 - 1509
  • [4] Query Access Assurance in Outsourced Databases
    Le, Wangchao
    Li, Feifei
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2012, 5 (02) : 178 - 191
  • [5] Secure Ranked Query Processing in Location Based Services Accessing Outsourced Spatial Databases
    Falke, Priyanka W.
    Mahalle, Vshwanath S.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 531 - 536
  • [6] Query assurance verification for dynamic outsourced XML databases
    Nguyen, Viet Hung
    Dang, Tran Khanh
    Son, Nguyen Thanh
    Kueng, Josef
    [J]. ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 689 - +
  • [7] Integrity Assurance of Outsourced Spatial Database
    Hong J.
    Wen T.
    Ye Z.-W.
    Kang J.
    [J]. Dongbei Daxue Xuebao/Journal of Northeastern University, 2019, 40 (03): : 327 - 333
  • [8] A Query Verification Scheme for Dynamic Outsourced Databases
    Wang, Xiaoming
    Yuan, Duobao
    [J]. JOURNAL OF COMPUTERS, 2012, 7 (01) : 156 - 160
  • [9] Integrity Assurance for Outsourced Databases without DBMS Modification
    Wei, Wei
    Yu, Ting
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 1 - 16
  • [10] Query assurance verification for outsourced multi-dimensional databases
    Cheng, Weiwei
    Tan, Kian-Lee
    [J]. JOURNAL OF COMPUTER SECURITY, 2009, 17 (01) : 101 - 126