A query integrity assurance scheme for accessing outsourced spatial databases

被引:27
|
作者
Ku, Wei-Shinn [1 ]
Hu, Ling [2 ]
Shahabi, Cyrus [2 ]
Wang, Haixun [3 ]
机构
[1] Auburn Univ, Dept Comp Sci & Software Engn, Auburn, AL 36849 USA
[2] Univ So Calif, Dept Comp Sci, Los Angeles, CA 90089 USA
[3] Microsoft Res Asia, Beijing Sigma Ctr, Beijing 100190, Peoples R China
基金
美国国家科学基金会;
关键词
Outsourcing; Privacy; Query integrity; Spatial databases; LOCATION; SERVICES;
D O I
10.1007/s10707-012-0156-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the trend of cloud computing, outsourcing databases to third party service providers is becoming a common practice for data owners to decrease the cost of managing and maintaining databases in-house. In conjunction, due to the popularity of location-based-services (LBS), the need for spatial data (e.g., gazetteers, vector data) is increasing dramatically. Consequently, there is a noticeably new tendency of outsourcing spatial datasets by data collectors. Two main challenges with outsourcing datasets are to keep the data private (from the data provider) and to ensure the integrity of the query result (for the clients). Unfortunately, most of the techniques proposed for privacy and integrity do not extend to spatial data in a straightforward manner. Hence, recent studies proposed various techniques to support either privacy or integrity (but not both) on spatial datasets. In this paper, for the first time, we propose a technique that can ensure both privacy and integrity for outsourced spatial data. In particular, we first use a one-way spatial transformation method based on Hilbert curves, which encrypts the spatial data before outsourcing and, hence, ensures its privacy. Next, by probabilistically replicating a portion of the data and encrypting it with a different encryption key, we devise a technique for the client to audit the trustworthiness of the query results. We show the applicability of our approach for both k-nearest-neighbor queries and spatial range queries, which are the building blocks of any LBS application. We also design solutions to guarantee the freshness of outsourced spatial databases. Finally, we evaluate the validity and performance of our algorithms with security analyses and extensive simulations.
引用
收藏
页码:97 / 124
页数:28
相关论文
共 50 条
  • [41] Towards Efficient Authenticated Subgraph Query Service in Outsourced Graph Databases
    Fan, Zhe
    Peng, Yun
    Choi, Byron
    Xu, Jianliang
    Bhowmick, Sourav S.
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2014, 7 (04) : 696 - 713
  • [42] Efficient Privacy-Preserving Query Processing on Outsourced Geographic Databases
    Zhao, Li
    Liu, Qin
    Huang, Hejiao
    Jia, Xiaohua
    [J]. 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [43] High-assurance integrity techniques for databases
    Bertino, Elisa
    Dai, Chenyun
    Lim, Hyo-Sang
    Lin, Dan
    [J]. SHARING DATA, INFORMATION AND KNOWLEDGE, PROCEEDINGS, 2008, 5071 : 244 - 256
  • [44] Models of integrity assurance in big relational databases
    Malikov, Andrey
    Voronkin, Vladimir
    Shiryaev, Nikolay
    [J]. PROCEEDINGS 2016 10TH INTERNATIONAL CONFERENCE ON THE QUALITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY (QUATIC), 2016, : 179 - 184
  • [45] Query rewriting for semantic query optimization in spatial databases
    Mella, Eduardo
    Andrea Rodriguez, M.
    Bravo, Loreto
    Gatica, Diego
    [J]. GEOINFORMATICA, 2019, 23 (01) : 79 - 104
  • [46] Query rewriting for semantic query optimization in spatial databases
    Eduardo Mella
    M. Andrea Rodríguez
    Loreto Bravo
    Diego Gatica
    [J]. GeoInformatica, 2019, 23 : 79 - 104
  • [47] Hilbert curve-based cryptographic transformation scheme for spatial query processing on outsourced private data
    Kim, Hyeong-Il
    Hong, Seungtae
    Chang, Jae-Woo
    [J]. DATA & KNOWLEDGE ENGINEERING, 2016, 104 : 32 - 44
  • [48] Spatial query processing on distributed databases
    [J]. 1600, Springer Science and Business Media Deutschland GmbH (20):
  • [49] Completeness Integrity Protection for Outsourced Databases Using Semantic Fake Data
    Roisum, Holly
    Urizar, Lois
    Yeh, Jyh-haw
    Salisbury, Kedric
    Magette, Megan
    [J]. 2019 4TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND INFORMATION SYSTEMS (ICCIS 2019), 2019, : 222 - 228
  • [50] Employing Bloom Filters for Enforcing Integrity of Outsourced Databases in Cloud Environments
    Aditya, T.
    Baruah, P. K.
    Mukkamala, R.
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 446 - +