Abstract
Recent advances in wireless communications and positioning devices have generated a tremendous amount of interest in the continuous monitoring of spatial queries. However, such applications can incur a heavy burden on the data owner (DO), due to very frequent location updates. Database outsourcing is a viable solution, whereby the DO delegates its database functionality to a service provider (SP) that has the infrastructure and resources to handle the high workload. In this framework, authenticated query processing enables the clients to verify the correctness of the query results that are returned by the SP. In addition to correctness, the dynamic nature of the monitored data requires the provision for temporal completeness, i.e., the clients must be able to verify that there are no missing results in between data updates. This paper constitutes the first work that deals with the authentication of continuous spatial queries, focusing on ranges. We first introduce a baseline solution (BSL) that achieves correctness and temporal completeness, but incurs false transmissions; that is, the SP has to notify clients whenever there is a data update, even if it does not affect their results. Then, we propose CSA, a mechanism that minimizes the processing and transmission overhead through an elaborate indexing scheme and a virtual caching mechanism. Finally, we derive analytical models to optimize the performance of our methods, and evaluate their effectiveness through extensive experiments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Babcock, B., Chaudhuri, S., Das, G.: Dynamic Sample Selection for Approximate Query Processing. In: SIGMOD (2003)
de Berg, M., van Kreveld, M., Overmars, M., Schwarzkopf, O.: Computational Geometry: Algorithms and Applications. Springer, Heidelberg (1997)
Cheng, W., Pang, H., Tan, K.-L.: Authenticating Multi-dimensional Query Results in Data Publishing. DBSec (2006)
Crypto++ Library, www.eskimo.com weidai/benchmark.html
Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.: Authentic Data Publication Over the Internet. Journal of Computer Security 11(3), 291–314 (2003)
Datta, V., Vandermeer, D., Celik, A., Kumar, V.: Broadcast Protocols to Support Efficient Retrieval from Databases by Mobile Users. ACM TODS 24(1), 1–79 (1999)
Guha, S., Shim, K., Woo, J.: Rehist: Relative Error Histogram Construction Algorithms. In: VLDB (2004)
Getoor, L., Taskar, B., Koller, D.: Selectivity Estimation using Probability Models. In: SIGMOD (2001)
Hacıgümüş, H., Iyer, B., Mehrotra, S.: Providing Databases as a Service. In: ICDE (2002)
Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic Authenticated Index Structures for Outsourced Databases. In: SIGMOD (2006)
Li, F., Yi, K., Hadjieleftheriou, M., Kollios, G.: Proof-Infused Streams: Enabling Authentication of Sliding Window Queries on Streams. In: VLDB (2007)
Merkle, R.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)
Mokbel, M., Aref, W., Kamel, I.: Analysis of Multi-Dimensional Space-Filling Curves. GeoInformatica 7(3), 179–209 (2003)
Moon, B., Jagadish, H.V., Faloutsos, C., Saltz, J.H.: Analysis of the Clustering Properties of the Hilbert Space-Filling Curve. TKDE 13(1), 124–141 (2001)
National Institute of Standards and Technology. FIPS PUB 180-1: Secure Hash Standard. National Institute of Standards and Technology (1995)
Narasimha, M., Tsudik, G.: Authentication of Outsourced Databases Using Signature Aggregation and Chaining. In: Li Lee, M., Tan, K.-L., Wuwongse, V. (eds.) DASFAA 2006. LNCS, vol. 3882, pp. 420–436. Springer, Heidelberg (2006)
Pang, H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying Completeness of Relational Query Results in Data Publishing. In: SIGMOD (2005)
Pang, H., Tan, K.-L.: Authenticating Query Results in Edge Computing. In: ICDE (2004)
Papadopoulos, S., Yang, Y., Papadias, D.: CADS: Continuous Authentication on Data Streams. In: VLDB (2007)
Rivest, R.L., Shamir, A., Adleman, L.: A method for Obtaining Digital Signatures and Public-key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Spatial Outsourcing for Location-based Services. In: ICDE (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Papadopoulos, S., Yang, Y., Bakiras, S., Papadias, D. (2009). Continuous Spatial Authentication. In: Mamoulis, N., Seidl, T., Pedersen, T.B., Torp, K., Assent, I. (eds) Advances in Spatial and Temporal Databases. SSTD 2009. Lecture Notes in Computer Science, vol 5644. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02982-0_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-02982-0_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02981-3
Online ISBN: 978-3-642-02982-0
eBook Packages: Computer ScienceComputer Science (R0)