A query integrity assurance scheme for accessing outsourced spatial databases

被引:27
|
作者
Ku, Wei-Shinn [1 ]
Hu, Ling [2 ]
Shahabi, Cyrus [2 ]
Wang, Haixun [3 ]
机构
[1] Auburn Univ, Dept Comp Sci & Software Engn, Auburn, AL 36849 USA
[2] Univ So Calif, Dept Comp Sci, Los Angeles, CA 90089 USA
[3] Microsoft Res Asia, Beijing Sigma Ctr, Beijing 100190, Peoples R China
基金
美国国家科学基金会;
关键词
Outsourcing; Privacy; Query integrity; Spatial databases; LOCATION; SERVICES;
D O I
10.1007/s10707-012-0156-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the trend of cloud computing, outsourcing databases to third party service providers is becoming a common practice for data owners to decrease the cost of managing and maintaining databases in-house. In conjunction, due to the popularity of location-based-services (LBS), the need for spatial data (e.g., gazetteers, vector data) is increasing dramatically. Consequently, there is a noticeably new tendency of outsourcing spatial datasets by data collectors. Two main challenges with outsourcing datasets are to keep the data private (from the data provider) and to ensure the integrity of the query result (for the clients). Unfortunately, most of the techniques proposed for privacy and integrity do not extend to spatial data in a straightforward manner. Hence, recent studies proposed various techniques to support either privacy or integrity (but not both) on spatial datasets. In this paper, for the first time, we propose a technique that can ensure both privacy and integrity for outsourced spatial data. In particular, we first use a one-way spatial transformation method based on Hilbert curves, which encrypts the spatial data before outsourcing and, hence, ensures its privacy. Next, by probabilistically replicating a portion of the data and encrypting it with a different encryption key, we devise a technique for the client to audit the trustworthiness of the query results. We show the applicability of our approach for both k-nearest-neighbor queries and spatial range queries, which are the building blocks of any LBS application. We also design solutions to guarantee the freshness of outsourced spatial databases. Finally, we evaluate the validity and performance of our algorithms with security analyses and extensive simulations.
引用
收藏
页码:97 / 124
页数:28
相关论文
共 50 条
  • [31] Authenticated indexing for outsourced spatial databases
    Yin Yang
    Stavros Papadopoulos
    Dimitris Papadias
    George Kollios
    [J]. The VLDB Journal, 2009, 18 : 631 - 648
  • [32] A Scheme for Verifying the Integrity of Outsourced Data
    WANG Xiaoming
    YU Fang
    LIN Yanchun
    GAN Qingqing
    WU Daini
    [J]. China Communications, 2015, 12 (11) : 188 - 195
  • [33] Access control scheme with tracing for outsourced databases
    Wang, Xiaoming
    Yao, Guoxiang
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2012, 6 (06) : 677 - 685
  • [34] Access control scheme with tracing for outsourced databases
    Xiaoming Wang
    Guoxiang Yao
    [J]. Frontiers of Computer Science, 2012, 6 : 677 - 685
  • [35] Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud
    Yuan, Jiawei
    Yu, Shucheng
    [J]. 2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 520 - 524
  • [36] Providing Query Assurance for Outsourced Tree-Indexed Data
    Dang, Tran Khanh
    Son, Nguyen Thanh
    [J]. MODELING, SIMULATION AND OPTIMIZATION OF COMPLEX PROCESSES, 2008, : 207 - 224
  • [37] A solution of spatial query processing and query optimization for spatial databases
    YUAN Jie 1
    2. Department of Intelligence Science
    3. Beijing Institute of Surveying and Mapping
    [J]. 重庆邮电大学学报(自然科学版), 2004, (05) : 165 - 172
  • [38] An integrity checking scheme in outsourced database model
    Xian, Hequn
    Feng, Dengguo
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2010, 47 (06): : 1107 - 1115
  • [39] Toward integrity assurance of outsourced computing - a game theoretic perspective
    Wang, Yongzhi
    Wei, Jinpeng
    Ren, Shaolei
    Shen, Yulong
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 : 87 - 100
  • [40] Provably-secure schemes for basic query support in outsourced databases
    Amanatidis, Georgios
    Boldyreva, Alexandra
    O'Neill, Adam
    [J]. DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 14 - +