A spatial transformation scheme supporting data privacy and query integrity for security of outsourced databases

被引:2
|
作者
Kim, Hyeong-Il [1 ]
Hossain, Al-Amin [1 ]
Chang, Jae-Woo [1 ,2 ]
机构
[1] Chonbuk Natl Univ, Dept Comp Engn, Jeonju, South Korea
[2] Chonbuk Natl Univ, Cloud Open R&D Ctr, Jeonju, South Korea
基金
新加坡国家研究基金会;
关键词
database security; database encryption; shear transformation; proximity attack; data privacy; query integrity;
D O I
10.1002/sec.833
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Outsourcing database to a third-party data provider is becoming a common practice for data owners to avoid the cost of managing and maintaining the database. Meanwhile, because of the popularity of location-based services, the need for spatial data is increasing dramatically. However, the most important challenge in database outsourcing is how to meet privacy requirements and guarantee the integrity of the query result as well. Unfortunately, most of the existing techniques support either data privacy or integrity on spatial databases. To carry on both privacy and integrity for outsourced spatial data, we propose a spatial transformation scheme that makes use of shearing transformation with rotation shifting. We describe attack models measuring the data privacy of our transformation scheme. Finally, our extensive experiments have demonstrated that our scheme has adequate strength for data privacy by showing outstanding performance against different kinds of attack models and efficiently handles the query integrity of the query result sets. Copyright (C) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:1498 / 1509
页数:12
相关论文
共 50 条
  • [1] A query integrity assurance scheme for accessing outsourced spatial databases
    Ku, Wei-Shinn
    Hu, Ling
    Shahabi, Cyrus
    Wang, Haixun
    [J]. GEOINFORMATICA, 2013, 17 (01) : 97 - 124
  • [2] A query integrity assurance scheme for accessing outsourced spatial databases
    Wei-Shinn Ku
    Ling Hu
    Cyrus Shahabi
    Haixun Wang
    [J]. GeoInformatica, 2013, 17 : 97 - 124
  • [3] A privacy-preserving aggregate query scheme on outsourced databases
    Jiang, Ya-Jun
    Yang, Bo
    Zhang, Ming-Wu
    Chen, Xu-Ri
    [J]. Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2011, 42 (03): : 721 - 725
  • [4] Privacy Protection in Outsourced Spatial Databases
    Kamel, Ibrahim
    Ba-Hutair, Mohammed N.
    [J]. INTERNATIONAL JOURNAL OF SEMANTIC COMPUTING, 2016, 10 (03) : 347 - 363
  • [5] A Query Verification Scheme for Dynamic Outsourced Databases
    Wang, Xiaoming
    Yuan, Duobao
    [J]. JOURNAL OF COMPUTERS, 2012, 7 (01) : 156 - 160
  • [6] Query Integrity Assurance of Location-Based Services Accessing Outsourced Spatial Databases
    Ku, Wei-Shinn
    Hu, Ling
    Shahabi, Cyrus
    Wang, Haixun
    [J]. ADVANCES IN SPATIAL AND TEMPORAL DATABASES, PROCEEDINGS, 2009, 5644 : 80 - +
  • [7] Data integrity verification scheme with designated verifiers for dynamic outsourced databases
    Wang, Xiaoming
    Lin, Yanchun
    Yao, Guoxiang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2293 - 2301
  • [8] Integrity coded databases- protecting data integrity for outsourced databases
    Yeh, Jyh-haw
    Arifin, Md Mashrur
    Shen, Ning
    Karki, Ujwal
    Xie, Yi
    Nanjundarao, Archana
    [J]. COMPUTERS & SECURITY, 2024, 136
  • [9] Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey
    Zhang, Bo
    Dong, Boxiang
    Wang, Wendy Hui
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2021, 33 (04) : 1601 - 1618
  • [10] Hilbert curve-based cryptographic transformation scheme for spatial query processing on outsourced private data
    Kim, Hyeong-Il
    Hong, Seungtae
    Chang, Jae-Woo
    [J]. DATA & KNOWLEDGE ENGINEERING, 2016, 104 : 32 - 44