Advertisement

World Wide Web

, Volume 22, Issue 2, pp 437–454 | Cite as

A resource-aware approach for authenticating privacy preserving GNN queries

  • Yan Dai
  • Jie ShaoEmail author
  • Gang Hu
  • Long Guo
Article
  • 344 Downloads
Part of the following topical collections:
  1. Special Issue on Deep vs. Shallow: Learning for Emerging Web-scale Data Computing and Applications

Abstract

Nowadays many location service providers (LSPs) employ spatial databases outsourced from a third-party data owner (DO) to answer various users’ queries, e.g., group nearest neighbor (GNN) queries that enable a group of users to find a meeting place minimizing their aggregate travel distance. Along with the benefits from LSPs and DO, protection of location privacy and authentication of query results become two major concerns for users while assessing GNN queries. This paper proposes a resource-aware approach that supports effective location privacy preservation and efficient query result authentication with a less storage, communication and computation overhead. Specifically, two centroid-based techniques are investigated to generate a centroid point, which initiates GNN query on behalf of the group members. Then, an authentication algorithm based on Voronoi diagram is proposed for spatial queries. Finally, we demonstrate how our approach is resistant to various attacks, and evaluate its performance by comparing with three competitive approaches. The results show the proposed approach is better and more economical in terms of resource overhead, while considering both privacy preservation and query authentication.

Keywords

Group nearest neighbor queries Location privacy Query authentication 

Notes

Acknowledgements

This work is supported by the National Natural Science Foundation of China (grants No. 61672133, No. 61632007 and No. 61602087), and the Fundamental Research Funds for the Central Universities (grants No. ZYGX2015J058 and No. ZYGX2014Z007).

References

  1. 1.
    Andrés, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-Indistinguishability: differential privacy for location-based systems. In: SIGSAC, pp 901–914 (2013)Google Scholar
  2. 2.
    Ashouri-Talouki, M., Baraani-Dastjerdi, A., Selçuk, A.A.: GLP: a cryptographic approach for group location privacy. Comput. Commun. 35(12), 1527–1533 (2012)CrossRefGoogle Scholar
  3. 3.
    Ashouri-Talouki, M., Baraani-Dastjerdi, A., Selçuk, A.A.: The cloaked-centroid protocol: location privacy protection for a group of users of location-based services. Knowl. Inf. Syst. 45(3), 589–615 (2015)CrossRefGoogle Scholar
  4. 4.
    Chen, Q., Hu, H., Xu, J.: Authenticating top-k queries in location-based services with confidentiality. PVLDB 7(1), 49–60 (2013)Google Scholar
  5. 5.
    Fu, Z., Shu, J., Wang, J., Liu, Y., Lee, S.: Privacy-preserving smart similarity search based on simhash over encrypted data in cloud computing. J. Internet Technol. 16(3), 453–460 (2015)Google Scholar
  6. 6.
    Gedik, B., Liu, L.: Location privacy in mobile systems: a personalized anonymization model. In: ICDCS, pp 620–629 (2005)Google Scholar
  7. 7.
    Ghinita, G., Kalnis, P., Skiadopoulos, S.: Mobihide: a mobilea peer-to-peer system for anonymous location-based queries. In: SSTD, pp 221–238 (2007)Google Scholar
  8. 8.
    Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.: Private queries in location based services: anonymizers are not necessary. In: SIGMOD, pp 121–132 (2008)Google Scholar
  9. 9.
    Hao, F., Zielinski, P.: The power of anonymous veto in public discussion. Trans. Computational Science 4, 41–52 (2009)zbMATHGoogle Scholar
  10. 10.
    Hashem, T., Kulik, L., Zhang, R.: Privacy Preserving Group Nearest Neighbor Queries. In: EDBT, pp 489–500 (2010)Google Scholar
  11. 11.
    Hashem, T., Ali, M.E., Kulik, L., Tanin, E., Quattrone, A.: Protecting privacy for group nearest neighbor queries with crowdsourced data and computing. In: Ubicomp, pp 559–562 (2013)Google Scholar
  12. 12.
    Hashem, T., Datta, S., Islam, T.U., Ali, M.E., Kulik, L., Tanin, E.: A unified framework for authenticating privacy preserving location based services. In: Georich@SIGMOD 2015, pp 13–18 (2015)Google Scholar
  13. 13.
    Hu, H., Xu, J.: Non-exposure location anonymity. In: ICDE, pp 1120–1131 (2009)Google Scholar
  14. 14.
    Hu, H., Xu, J., Chen, Q., Yang, Z.: Authenticating location-based services without compromising location privacy. In: SIGMOD, pp 301–312 (2012)Google Scholar
  15. 15.
    Hu, L., Ku, W., Bakiras, S., Shahabi, C.: Spatial query integrity with voronoi neighbors. IEEE Trans. Knowl. Data Eng. 25(4), 863–876 (2013)CrossRefGoogle Scholar
  16. 16.
    Huang, Y., Vishwanathan, R.: Privacy preserving group nearest neighbour queries in location-based services using cryptographic techniques. In: GLOBECOM, pp 1–5 (2010)Google Scholar
  17. 17.
    Khan, A.K.M.M.R., Hashem, T., Tanin, E., Kulik, L.: Location Oblivious Privacy Protection for Group Nearest Neighbor Queries. In: GIScience, pp 301–317 (2014)Google Scholar
  18. 18.
    Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: SSTD, pp 239–257 (2007)Google Scholar
  19. 19.
    Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: ICPS, pp 88–97 (2005)Google Scholar
  20. 20.
    Okabe, A., Satoh, T., Furuta, T., Suzuki, A., Okano, K.: Generalized network voronoi diagrams: concepts, computational methods, and applications. Int. J. Geogr. Inf. Sci. 22(9), 965–994 (2008)CrossRefGoogle Scholar
  21. 21.
    Paillier, P., Pointcheval, D.: Efficient public-key cryptosystems provably secure against active adversaries. In: ASIACRYPT, pp 165–179 (1999)Google Scholar
  22. 22.
    Papadias, D., Shen, Q., Tao, Y., Mouratidis, K.: Group nearest neighbor queries. In: ICDE, pp 301–312 (2004)Google Scholar
  23. 23.
    Papadopoulos, S., Yang, Y., Bakiras, S., Papadias, D.: Continuous spatial authentication. In: SSTD, pp. 62–79 (2009)Google Scholar
  24. 24.
    Sadeghi, A., Visconti, I., Wachsmann, C.: Anonymizer-enabled security and privacy for RFID. In: CANS, pp 134–153 (2009)Google Scholar
  25. 25.
    Sheikh, R., Mishra, D.K., Kumar, B.: Secure multiparty computation: from millionaires problem to anonymizer. Information Security Journal: A Global Perspective 20(1), 25–33 (2011)Google Scholar
  26. 26.
    Shen, J., Liu, D., Shen, J., Liu, Q., Sun, X.: A secure cloud-assisted urban data sharing framework for ubiquitous-cities. Pervasive Mob. Comput. (2017).  https://doi.org/10.1016/j.pmcj.2017.03.013
  27. 27.
    Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W.: An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. 12(10), 2402–2415 (2017)CrossRefGoogle Scholar
  28. 28.
    Song, J., Shen, H.T., Wang, J., Huang, Z., Sebe, N., Wang, J.: A distance-computation-free search scheme for binary code databases. IEEE Trans Multimedia 18(3), 484–495 (2016)CrossRefGoogle Scholar
  29. 29.
    Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowledge Based Syst. 10(5), 557–570 (2002)MathSciNetCrossRefzbMATHGoogle Scholar
  30. 30.
    Um, J., Kim, Y., Lee, H., Jang, M., Chang, J.: k-nearest neighbor query processing algorithm for cloaking regions towards user privacy protection in location-based services. Journal of Systems Architecture - Embedded Systems Design 58(9), 354–371 (2012)Google Scholar
  31. 31.
    Xu, S., Yang, W., Lau, F.C.M.: A visualization based approach for digital signature authentication. Comput. Graph. Forum 28(3), 935–942 (2009)CrossRefGoogle Scholar
  32. 32.
    Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Authenticated indexing for outsourced spatial databases. VLDB J. 18(3), 631–648 (2009)CrossRefGoogle Scholar
  33. 33.
    Yiu, M.L., Ghinita, G., Jensen, C.S., Kalnis, P.: Enabling search services on outsourced private spatial data. VLDB J. 19(3), 363–384 (2010)CrossRefGoogle Scholar
  34. 34.
    Zhu, X., Zhang, L., Huang, Z.: A sparse embedding and least variance encoding approach to hashing. IEEE Trans. Image Process. 23(9), 3737–3750 (2014)MathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2017

Authors and Affiliations

  1. 1.Center for Future Media & School of Computer Science and EngineeringUniversity of Electronic Science and Technology of ChinaChengduChina
  2. 2.School of Electronics Engineering and Computer SciencePeking UniversityBeijingChina

Personalised recommendations