Advertisement

Authentication of Reverse k Nearest Neighbor Query

  • Guohui Li
  • Changyin LuoEmail author
  • Jianjun Li
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9049)

Abstract

In outsourced spatial databases, the LBS provides query services to the clients on behalf of the data owner. However, the LBS provider is not always trustworthy and it may send incomplete or incorrect query results to the clients. Therefore, ensuring spatial query integrity is critical. In this paper, we propose efficient RkNN query verification techniques which utilize the influence zone to check the integrity of query results. The methods in this work aim to verify both monochromatic and bichromatic RkNN queries results. Specifically, our methods can gain efficient performance on verifying bichromatic RkNN query results. Extensive experiments on both real and synthetic datasets demonstrate the efficiency of our proposed authenticating methods.

Keywords

Authentication RkNN queries Influence zone 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Cheema, M.A., Lin, X., Zhang, W., Zhang, Y.: Influence zone: efficiently processing reverse k nearest neighbors queries. In: 2011 IEEE 27th International Conference on Data Engineering (ICDE), pp. 577–588. IEEE (2011)Google Scholar
  2. 2.
    Cheema, M.A., Lin, X., Zhang, Y., Wang, W., Zhang, W.: Lazy updates: An efficient technique to continuously monitoring reverse knn. Proceedings of the VLDB Endowment 2(1), 1138–1149 (2009)CrossRefGoogle Scholar
  3. 3.
    Chen, Q., Hu, H., Xu, J.: Authenticating top-k queries in location-based services with confidentiality. Proc. of the VLDB Endowment 7(1), 49–60 (2014)Google Scholar
  4. 4.
    Hu, L., Ku, W.S., Bakiras, S., Shahabi, C.: Spatial query integrity with voronoi neighbors. IEEE Transactions on Knowledge and Data Engineering 25(4), 863–876 (2013)CrossRefGoogle Scholar
  5. 5.
    Jing, Y., Hu, L., Ku, W.S., Shahabi, C.: Authentication of k nearest neighbor query on road networks. IEEE Transactions on Knowledge and Data Engineering 26(6), 1494–1506 (2014)CrossRefGoogle Scholar
  6. 6.
    Korn, F., Muthukrishnan, S.: Influence sets based on reverse nearest neighbor queries. In: ACM SIGMOD Record, vol. 29, pp. 201–212. ACM (2000)Google Scholar
  7. 7.
    Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, pp. 121–132. ACM (2006)Google Scholar
  8. 8.
    Lin, X., Xu, J., Hu, H., Lee, W.C.: Authenticating location-based skyline queries in arbitrary subspaces. IEEE Transactions on Knowledge and Data Engineering 26(6), 1479–1493 (2014)CrossRefGoogle Scholar
  9. 9.
    Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990) Google Scholar
  10. 10.
    Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. ACM Transactions on Storage (TOS) 2(2), 107–138 (2006)CrossRefGoogle Scholar
  11. 11.
    Tao, Y., Papadias, D., Lian, X.: Reverse knn search in arbitrary dimensionality. In: Proceedings of the Thirtieth International Conference on Very Large Data Bases, vol. 30, pp. 744–755. VLDB Endowment (2004)Google Scholar
  12. 12.
    Wu, D., Choi, B., Xu, J., Jensen, C.: Authentication of Moving Top-k Spatial Keyword Queries (to appear) (2014)Google Scholar
  13. 13.
    Wu, W., Yang, F., Chan, C.Y., Tan, K.L.: Continuous reverse k-nearest-neighbor monitoring. In: 9th International Conference on Mobile Data Management, MDM 2008, pp. 132–139. IEEE (2008)Google Scholar
  14. 14.
    Wu, W., Yang, F., Chan, C.Y., Tan, K.L.: Finch: Evaluating reverse k-nearest-neighbor queries on location data. Proceedings of the VLDB Endowment 1(1), 1056–1067 (2008)CrossRefGoogle Scholar
  15. 15.
    Xie, M., Wang, H., Yin, J., Meng, X.: Integrity auditing of outsourced data. In: Proceedings of the 33rd International Conference on Very Large Data Bases, pp. 782–793. VLDB Endowment (2007)Google Scholar
  16. 16.
    Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Spatial outsourcing for location-based services. In: IEEE 24th International Conference on Data Engineering, ICDE 2008, pp. 1082–1091. IEEE (2008)Google Scholar
  17. 17.
    Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Authenticated indexing for outsourced spatial databases. The VLDB Journal, The International Journal on Very Large Data Bases 18(3), 631–648 (2009)CrossRefGoogle Scholar
  18. 18.
    Yiu, M.L., Lo, E., Yung, D.: Authentication of moving knn queries. In: 2011 IEEE 27th International Conference on Data Engineering (ICDE), pp. 565–576. IEEE (2011)Google Scholar
  19. 19.
    Yung, D., Lo, E., Yiu, M.L.: Authentication of moving range queries. In: Proceedings of the 21st ACM International Conference on Information and Knowledge Management, pp. 1372–1381. ACM (2012)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhanChina

Personalised recommendations