Skip to main content

Continuous Spatial Authentication

  • Conference paper
Advances in Spatial and Temporal Databases (SSTD 2009)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5644))

Included in the following conference series:

Abstract

Recent advances in wireless communications and positioning devices have generated a tremendous amount of interest in the continuous monitoring of spatial queries. However, such applications can incur a heavy burden on the data owner (DO), due to very frequent location updates. Database outsourcing is a viable solution, whereby the DO delegates its database functionality to a service provider (SP) that has the infrastructure and resources to handle the high workload. In this framework, authenticated query processing enables the clients to verify the correctness of the query results that are returned by the SP. In addition to correctness, the dynamic nature of the monitored data requires the provision for temporal completeness, i.e., the clients must be able to verify that there are no missing results in between data updates. This paper constitutes the first work that deals with the authentication of continuous spatial queries, focusing on ranges. We first introduce a baseline solution (BSL) that achieves correctness and temporal completeness, but incurs false transmissions; that is, the SP has to notify clients whenever there is a data update, even if it does not affect their results. Then, we propose CSA, a mechanism that minimizes the processing and transmission overhead through an elaborate indexing scheme and a virtual caching mechanism. Finally, we derive analytical models to optimize the performance of our methods, and evaluate their effectiveness through extensive experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Babcock, B., Chaudhuri, S., Das, G.: Dynamic Sample Selection for Approximate Query Processing. In: SIGMOD (2003)

    Google Scholar 

  2. de Berg, M., van Kreveld, M., Overmars, M., Schwarzkopf, O.: Computational Geometry: Algorithms and Applications. Springer, Heidelberg (1997)

    Book  MATH  Google Scholar 

  3. Cheng, W., Pang, H., Tan, K.-L.: Authenticating Multi-dimensional Query Results in Data Publishing. DBSec (2006)

    Google Scholar 

  4. Crypto++ Library, www.eskimo.com weidai/benchmark.html

    Google Scholar 

  5. Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.: Authentic Data Publication Over the Internet. Journal of Computer Security 11(3), 291–314 (2003)

    Article  MATH  Google Scholar 

  6. Datta, V., Vandermeer, D., Celik, A., Kumar, V.: Broadcast Protocols to Support Efficient Retrieval from Databases by Mobile Users. ACM TODS 24(1), 1–79 (1999)

    Article  Google Scholar 

  7. Guha, S., Shim, K., Woo, J.: Rehist: Relative Error Histogram Construction Algorithms. In: VLDB (2004)

    Google Scholar 

  8. Getoor, L., Taskar, B., Koller, D.: Selectivity Estimation using Probability Models. In: SIGMOD (2001)

    Google Scholar 

  9. Hacıgümüş, H., Iyer, B., Mehrotra, S.: Providing Databases as a Service. In: ICDE (2002)

    Google Scholar 

  10. Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic Authenticated Index Structures for Outsourced Databases. In: SIGMOD (2006)

    Google Scholar 

  11. Li, F., Yi, K., Hadjieleftheriou, M., Kollios, G.: Proof-Infused Streams: Enabling Authentication of Sliding Window Queries on Streams. In: VLDB (2007)

    Google Scholar 

  12. Merkle, R.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)

    Google Scholar 

  13. Mokbel, M., Aref, W., Kamel, I.: Analysis of Multi-Dimensional Space-Filling Curves. GeoInformatica 7(3), 179–209 (2003)

    Article  Google Scholar 

  14. Moon, B., Jagadish, H.V., Faloutsos, C., Saltz, J.H.: Analysis of the Clustering Properties of the Hilbert Space-Filling Curve. TKDE 13(1), 124–141 (2001)

    Google Scholar 

  15. National Institute of Standards and Technology. FIPS PUB 180-1: Secure Hash Standard. National Institute of Standards and Technology (1995)

    Google Scholar 

  16. Narasimha, M., Tsudik, G.: Authentication of Outsourced Databases Using Signature Aggregation and Chaining. In: Li Lee, M., Tan, K.-L., Wuwongse, V. (eds.) DASFAA 2006. LNCS, vol. 3882, pp. 420–436. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  17. Pang, H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying Completeness of Relational Query Results in Data Publishing. In: SIGMOD (2005)

    Google Scholar 

  18. Pang, H., Tan, K.-L.: Authenticating Query Results in Edge Computing. In: ICDE (2004)

    Google Scholar 

  19. Papadopoulos, S., Yang, Y., Papadias, D.: CADS: Continuous Authentication on Data Streams. In: VLDB (2007)

    Google Scholar 

  20. Rivest, R.L., Shamir, A., Adleman, L.: A method for Obtaining Digital Signatures and Public-key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  21. Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Spatial Outsourcing for Location-based Services. In: ICDE (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Papadopoulos, S., Yang, Y., Bakiras, S., Papadias, D. (2009). Continuous Spatial Authentication. In: Mamoulis, N., Seidl, T., Pedersen, T.B., Torp, K., Assent, I. (eds) Advances in Spatial and Temporal Databases. SSTD 2009. Lecture Notes in Computer Science, vol 5644. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02982-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02982-0_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02981-3

  • Online ISBN: 978-3-642-02982-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics