Skip to main content

An Authentication Approach for Multiple-User Location-Based Queries

  • Conference paper
  • First Online:
Frontiers in Cyber Security (FCS 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 879))

Included in the following conference series:

Abstract

With the increasing use of smart mobile devices, users can connect and coordinate with local people or events that match their interests through geosocial networking applications. This calls for techniques to support processing the Multiple-User Location-based Query (MULQ), which returns a group of users with k Point of Interests (POIs) based on their locations and individual preferences. When the query processing is outsourced to a service provider capable of handling voluminous spatial data objects, the query authentication becomes highly desirable because the service provider is beyond the administrative domain of a data owner. In this paper, we design an MRS-tree to index POIs, based on which, we propose a MULQ processing and authentication solution. We further proposed a bitmap-based dominance relationship comparison algorithm to improve its efficiency. A set of experiments are carried out, which shows the validity of our solutions under various parameters.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Pang, H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying completeness of relational query results in data publishing. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 407–418. ACM (2005)

    Google Scholar 

  2. Hu, L., Ku, W.S., Bakiras, S., Shahabi, C.: Spatial query integrity with voronoi neighbors. IEEE Trans. Knowl. Data Eng. 25(4), 863–876 (2013)

    Article  Google Scholar 

  3. Lin, X., Xu, J., Hu, H., Lee, W.C.: Location-based skyline queries in arbitrary subspaces. IEEE Trans. Knowl. Data Eng. 26(6), 1479–1493 (2014)

    Article  Google Scholar 

  4. Wang, Y., Gao, S., Zhang, J., Nie, X., Duan, X., Chen, J.: Authenticating multiple user-defined spatial queries. In: 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), vol. 1, pp. 471–480. IEEE (2016)

    Google Scholar 

  5. Zhang, R., Sun, J., Zhang, Y., Zhang, C.: Secure spatial top-k query processing via untrusted location-based service providers. IEEE Trans. Depend. Secure Comput. 12(1), 111–124 (2015)

    Article  Google Scholar 

  6. Zhang, R., Zhang, Y., Zhang, C.: Secure top-k query processing via untrusted location-based service providers. In: 2012 Proceedings IEEE INFOCOM, pp. 1170–1178. IEEE (2012)

    Google Scholar 

  7. Su, S., Yan, H., Cheng, X., Tang, P., Xu, P., Xu, J.: Authentication of top-\(k\) spatial keyword queries in outsourced databases. In: Renz, M., Shahabi, C., Zhou, X., Cheema, M.A. (eds.) DASFAA 2015. LNCS, vol. 9049, pp. 567–588. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-18120-2_33

    Chapter  Google Scholar 

  8. Wu, D., Choi, B., Xu, J., Jensen, C.S.: Authentication of moving top-k spatial keyword queries. IEEE Trans. Knowl. Data Eng. 27(4), 922–935 (2015)

    Article  Google Scholar 

  9. Papadias, D., Tao, Y., Mouratidis, K., Hui, C.K.: Aggregate nearest neighbor queries in spatial databases. ACM Trans. Database Syst. (TODS) 30(2), 529–576 (2005)

    Article  Google Scholar 

  10. Yang, G., Cai, Y., Hu, Z.: Authentic publication of mathematical functions. In: Proceedings of International Conference on Data Engineering (ICDE), pp. 631–648. IEEE (2016)

    Google Scholar 

  11. Duan, X., Wang, Y., Chen, J., Zhang, J.: Authenticating preference-oriented multiple users spatial queries. In: 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), vol. 1, pp. 602–607, July 2017. https://doi.org/10.1109/COMPSAC.2017.68

  12. Yiu, M.L., Mamoulis, N.: Efficient processing of top-k dominating queries on multidimensional data. In: Proceedings of the 33rd International Conference on Very Large Databases, pp. 483–494. VLDB Endowment (2007)

    Google Scholar 

  13. Amer-Yahia, S., Roy, S.B., Chawlat, A., Das, G., Yu, C.: Group recommendation: semantics and efficiency. Proc. VLDB Endow. 2(1), 754–765 (2009)

    Article  Google Scholar 

  14. Eastlake, D., Jones, P.: Us secure hash algorithm 1 (sha1) (2001)

    Google Scholar 

  15. Leskovec, J., Krevl, A.: SNAP datasets: Stanford large network dataset collection. http://snap.stanford.edu/data. Accessed June 2014

Download references

Acknowledgments

This work is supported by the National Key Research and Development Program of China (Grant No. 2016QY04W0802), the Science and Technology Program of Sichuan, China (Grant No. 2016JY0007), and the Fundamental Research Funds for the Central Universities (Grant No. ZYGX2016J216).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdelrhman Hassan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, Y., Hassan, A., Duan, X., Yang, X., Zhang, Y., Zhang, X. (2018). An Authentication Approach for Multiple-User Location-Based Queries. In: Li, F., Takagi, T., Xu, C., Zhang, X. (eds) Frontiers in Cyber Security. FCS 2018. Communications in Computer and Information Science, vol 879. Springer, Singapore. https://doi.org/10.1007/978-981-13-3095-7_20

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-3095-7_20

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-3094-0

  • Online ISBN: 978-981-13-3095-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics