Abstract
With the increasing use of smart mobile devices, users can connect and coordinate with local people or events that match their interests through geosocial networking applications. This calls for techniques to support processing the Multiple-User Location-based Query (MULQ), which returns a group of users with k Point of Interests (POIs) based on their locations and individual preferences. When the query processing is outsourced to a service provider capable of handling voluminous spatial data objects, the query authentication becomes highly desirable because the service provider is beyond the administrative domain of a data owner. In this paper, we design an MRS-tree to index POIs, based on which, we propose a MULQ processing and authentication solution. We further proposed a bitmap-based dominance relationship comparison algorithm to improve its efficiency. A set of experiments are carried out, which shows the validity of our solutions under various parameters.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Pang, H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying completeness of relational query results in data publishing. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 407–418. ACM (2005)
Hu, L., Ku, W.S., Bakiras, S., Shahabi, C.: Spatial query integrity with voronoi neighbors. IEEE Trans. Knowl. Data Eng. 25(4), 863–876 (2013)
Lin, X., Xu, J., Hu, H., Lee, W.C.: Location-based skyline queries in arbitrary subspaces. IEEE Trans. Knowl. Data Eng. 26(6), 1479–1493 (2014)
Wang, Y., Gao, S., Zhang, J., Nie, X., Duan, X., Chen, J.: Authenticating multiple user-defined spatial queries. In: 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), vol. 1, pp. 471–480. IEEE (2016)
Zhang, R., Sun, J., Zhang, Y., Zhang, C.: Secure spatial top-k query processing via untrusted location-based service providers. IEEE Trans. Depend. Secure Comput. 12(1), 111–124 (2015)
Zhang, R., Zhang, Y., Zhang, C.: Secure top-k query processing via untrusted location-based service providers. In: 2012 Proceedings IEEE INFOCOM, pp. 1170–1178. IEEE (2012)
Su, S., Yan, H., Cheng, X., Tang, P., Xu, P., Xu, J.: Authentication of top-\(k\) spatial keyword queries in outsourced databases. In: Renz, M., Shahabi, C., Zhou, X., Cheema, M.A. (eds.) DASFAA 2015. LNCS, vol. 9049, pp. 567–588. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-18120-2_33
Wu, D., Choi, B., Xu, J., Jensen, C.S.: Authentication of moving top-k spatial keyword queries. IEEE Trans. Knowl. Data Eng. 27(4), 922–935 (2015)
Papadias, D., Tao, Y., Mouratidis, K., Hui, C.K.: Aggregate nearest neighbor queries in spatial databases. ACM Trans. Database Syst. (TODS) 30(2), 529–576 (2005)
Yang, G., Cai, Y., Hu, Z.: Authentic publication of mathematical functions. In: Proceedings of International Conference on Data Engineering (ICDE), pp. 631–648. IEEE (2016)
Duan, X., Wang, Y., Chen, J., Zhang, J.: Authenticating preference-oriented multiple users spatial queries. In: 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), vol. 1, pp. 602–607, July 2017. https://doi.org/10.1109/COMPSAC.2017.68
Yiu, M.L., Mamoulis, N.: Efficient processing of top-k dominating queries on multidimensional data. In: Proceedings of the 33rd International Conference on Very Large Databases, pp. 483–494. VLDB Endowment (2007)
Amer-Yahia, S., Roy, S.B., Chawlat, A., Das, G., Yu, C.: Group recommendation: semantics and efficiency. Proc. VLDB Endow. 2(1), 754–765 (2009)
Eastlake, D., Jones, P.: Us secure hash algorithm 1 (sha1) (2001)
Leskovec, J., Krevl, A.: SNAP datasets: Stanford large network dataset collection. http://snap.stanford.edu/data. Accessed June 2014
Acknowledgments
This work is supported by the National Key Research and Development Program of China (Grant No. 2016QY04W0802), the Science and Technology Program of Sichuan, China (Grant No. 2016JY0007), and the Fundamental Research Funds for the Central Universities (Grant No. ZYGX2016J216).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wang, Y., Hassan, A., Duan, X., Yang, X., Zhang, Y., Zhang, X. (2018). An Authentication Approach for Multiple-User Location-Based Queries. In: Li, F., Takagi, T., Xu, C., Zhang, X. (eds) Frontiers in Cyber Security. FCS 2018. Communications in Computer and Information Science, vol 879. Springer, Singapore. https://doi.org/10.1007/978-981-13-3095-7_20
Download citation
DOI: https://doi.org/10.1007/978-981-13-3095-7_20
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3094-0
Online ISBN: 978-981-13-3095-7
eBook Packages: Computer ScienceComputer Science (R0)