Skip to main content

Authentication of Skyline Query over Road Networks

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11342))

Abstract

With the increase of location-aware and Internet-capable mobile handset devices, location-based services (LBSs) have experienced an explosive growth in recent years. To scale up services, location-based service providers (LBSPs) outsource data management to third-party cloud service providers (CSPs), which in turn provide data query services to users on behalf of LBSPs. However, the CSPs cannot be trusted, which may return incorrect or incomplete query results to users, intentionally or not. Skyline query is an important kind of query, which asks for the data that is not spatially dominated by any other data. Therefore, enabling users to authenticate skyline query results is essential for outsourced LBSs. In this paper, we propose an authentication solution to support location-based skyline query. By embedding each data with its skyline neighbors in the data’s signature, our solution allows users to efficiently verify the soundness and completeness of location-based skyline query results. Through theoretical analysis, we demonstrate the effectiveness of our proposed solution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zheng, B., Lee, K.C.K., Lee, W.-C.: Location-dependent skyline query. In: Proceedings of the 9th International Conference on Mobile Data Management, pp. 148–155 (2008)

    Google Scholar 

  2. Lee, K.C.K.: Efficient evaluation of location-dependent skyline queries using non-dominance scopes. In: Proceedings of the 2nd International Conference on Computing for Geospatial Research & Applications, p. 14 (2011)

    Google Scholar 

  3. Goncalves, M., Torres, D., Perera, G.: Making recommendations using location-based skyline queries. In: Proceedings of the 23rd International Workshop on Database and Expert Systems Applications (DEXA), pp. 111–115 (2012)

    Google Scholar 

  4. Chen, W., Liu, M., Zhang, R., Zhang, Y., Liu, S.: Secure outsourced skyline query processing via untrusted cloud service providers. In INFOCOM, pp. 1–9 (2016)

    Google Scholar 

  5. Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.G.: Authentic data publication over the internet. J. Comput. Secur. 11(3), 291–314 (2003)

    Article  Google Scholar 

  6. Pang, H.H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying completeness of relational query results in data publishing. In: ACM SIGMOD, pp. 407–418 (2005)

    Google Scholar 

  7. Ku, W.-S., Hu, L., Shahabi, C., Wang, H.: Query integrity assurance of location-based services accessing outsourced spatial databases. In: Mamoulis, N., Seidl, T., Pedersen, T.B., Torp, K., Assent, I. (eds.) SSTD 2009. LNCS, vol. 5644, pp. 80–97. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02982-0_8

    Chapter  Google Scholar 

  8. Yiu, M.L., Lo, E., Yung, D.: Authentication of moving KNN queries. In ICDE, pp. 565–576 (2011)

    Google Scholar 

  9. Yang, Y., Papadopoulos, S., Papadias, D.: Authenticated indexing for outsourced spatial databases. VLDB J. 18(3), 631–648 (2009)

    Article  Google Scholar 

  10. Hu, H., Xu, J., Chen, Q., Yang, Z.: Authenticating location-based services without compromising location privacy. In: ACM SIGMOD, pp. 301–312 (2012)

    Google Scholar 

  11. Zhang, R., Zhang, Y., Zhang, C.: Secure top-k query processing via untrusted location-based service providers. In: INFOCOM, pp. 1170–1178 (2012)

    Google Scholar 

  12. Chen, Q., Hu, H., Xu, J.: Authenticating top-k queries in location-based services with confidentiality. Proc. VLDB Endow. 7(1), 49–60 (2013)

    Article  Google Scholar 

  13. Zhang, R., Sun, J., Zhang, Y., Zhang, C.: Secure spatial top-k query processing via untrusted location-based service providers. IEEE Trans. Dependable Secure Comput. 12(1), 111–124 (2015)

    Article  Google Scholar 

  14. Yang, G., Cai, Y., Hu, Z.: Authentication of function queries. In: ICDE, pp. 337–348 (2016)

    Google Scholar 

  15. Zhu, X., Wu, J., Chang, W., Wang, G., Liu, Q.: Authentication of multi-dimensional top-k query on untrusted server. In: Proceedings of the IEEE/ACM International Symposium on Quality of Service (IWQoS) (2018)

    Google Scholar 

  16. Hu, L., Ku, W.-S., Bakiras, S., Shahabi, C.: Spatial query integrity with Voronoi neighbors. IEEE Trans. Knowl. Data Eng. 25(4), 863–876 (2013)

    Article  Google Scholar 

  17. Yiu, M.L., Lin, Y., Mouratidis, K.: Efficient verification of shortest path search via authenticated hints. In: ICDE, pp. 237–248 (2010)

    Google Scholar 

  18. Lin, X., Xu, J., Hu, H.: Authentication of location-based skyline queries. In: Proceedings of the 20th ACM International Conference on Information and Knowledge Management, pp. 1583–1588 (2011)

    Google Scholar 

  19. Lin, X., Xu, J., Hu, H., Lee, W.-C.: Authenticating location-based skyline queries in arbitrary subspaces. IEEE Trans. Knowl. Data Eng. 26(6), 1479–1493 (2014)

    Article  Google Scholar 

  20. Liu, Q., Wu, S., Pei, S., Wu, J., Peng, T., Wang, G.: Secure and efficient multi-attribute range queries based on comparable inner product encoding. In: 2018 IEEE Conference on Communications and Network Security (CNS), pp. 1–9. IEEE (2018)

    Google Scholar 

  21. Zhang, S., Wang, G., Bhuiyan, Md.Z.A., Liu, Q.: A dual privacy preserving scheme in continuous location-based services. IEEE Internet Things J. 5(5), 4191–4200 (2017)

    Google Scholar 

  22. Liu, Q., Wang, G., Li, F., Yang, S., Jie, W.: Preserving privacy with probabilistic indistinguishability in weighted social networks. IEEE Trans. Parallel Distrib. Syst. 28(5), 1417–1429 (2017)

    Article  Google Scholar 

  23. Zhang, Q., Liu, Q., Wang, G.: PRMS: a personalized mobile search over encrypted outsourced data. IEEE Access 6, 31541–31552 (2018)

    Article  Google Scholar 

  24. Zhu, X., Liu, Q., Wang, G.: A novel verifiable and dynamic fuzzy keyword search scheme over encrypted data in cloud computing. In: Trustcom/BigdataSE/ISPA, pp. 845–851 (2017)

    Google Scholar 

  25. Liu, Q., Wang, G., Liu, X., Peng, T., Wu, J.: Achieving reliable and secure services in cloud computing environments. Comput. Electric. Eng. 59, 153–164 (2016)

    Article  Google Scholar 

  26. Zheng, H., Chang, W., Wu, J.: Coverage and distinguishability requirements for traffic flow monitoring systems. In: IEEE/ACM 24th International Symposium on Quality of Service, pp. 1–10 (2016)

    Google Scholar 

  27. Chang, W., Wu, J.: Progressive or conservative: rationally allocate cooperative work in mobile social networks. IEEE Trans. Parallel Distrib. Syst. 26(7), 2020–2035 (2015)

    Article  Google Scholar 

  28. Lo, H., Ghinita, G.: Authenticating spatial skyline queries with low communication overhead. In: Proceedings of the third ACM Conference on Data and Application Security and Privacy, pp. 177–180 (2013)

    Google Scholar 

Download references

Acknowledgments

This work is supported in part by the National Natural Science Foundation of China under Grants 61632009 & 61472451, in part by the Guangdong Provincial Natural Science Foundation under Grant 2017A030308006 and High-Level Talents Program of Higher Education in Guangdong Province under Grant 2016ZJ01, in part by NSF and CSC grants CNS 1629746, CNS 1564128, CNS 1449860, CNS 1461932, CNS 1460971, CNS 1439672, in part by the China Scholarship Council under Grant 201606370141, in part by Hunan Provincial Natural Science Foundation 2017JJ2333.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guojun Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhu, X., Wu, J., Chang, W., Wang, G., Liu, Q. (2018). Authentication of Skyline Query over Road Networks. In: Wang, G., Chen, J., Yang, L. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2018. Lecture Notes in Computer Science(), vol 11342. Springer, Cham. https://doi.org/10.1007/978-3-030-05345-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-05345-1_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-05344-4

  • Online ISBN: 978-3-030-05345-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics