Abstract
With the increase of location-aware and Internet-capable mobile handset devices, location-based services (LBSs) have experienced an explosive growth in recent years. To scale up services, location-based service providers (LBSPs) outsource data management to third-party cloud service providers (CSPs), which in turn provide data query services to users on behalf of LBSPs. However, the CSPs cannot be trusted, which may return incorrect or incomplete query results to users, intentionally or not. Skyline query is an important kind of query, which asks for the data that is not spatially dominated by any other data. Therefore, enabling users to authenticate skyline query results is essential for outsourced LBSs. In this paper, we propose an authentication solution to support location-based skyline query. By embedding each data with its skyline neighbors in the data’s signature, our solution allows users to efficiently verify the soundness and completeness of location-based skyline query results. Through theoretical analysis, we demonstrate the effectiveness of our proposed solution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zheng, B., Lee, K.C.K., Lee, W.-C.: Location-dependent skyline query. In: Proceedings of the 9th International Conference on Mobile Data Management, pp. 148–155 (2008)
Lee, K.C.K.: Efficient evaluation of location-dependent skyline queries using non-dominance scopes. In: Proceedings of the 2nd International Conference on Computing for Geospatial Research & Applications, p. 14 (2011)
Goncalves, M., Torres, D., Perera, G.: Making recommendations using location-based skyline queries. In: Proceedings of the 23rd International Workshop on Database and Expert Systems Applications (DEXA), pp. 111–115 (2012)
Chen, W., Liu, M., Zhang, R., Zhang, Y., Liu, S.: Secure outsourced skyline query processing via untrusted cloud service providers. In INFOCOM, pp. 1–9 (2016)
Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.G.: Authentic data publication over the internet. J. Comput. Secur. 11(3), 291–314 (2003)
Pang, H.H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying completeness of relational query results in data publishing. In: ACM SIGMOD, pp. 407–418 (2005)
Ku, W.-S., Hu, L., Shahabi, C., Wang, H.: Query integrity assurance of location-based services accessing outsourced spatial databases. In: Mamoulis, N., Seidl, T., Pedersen, T.B., Torp, K., Assent, I. (eds.) SSTD 2009. LNCS, vol. 5644, pp. 80–97. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02982-0_8
Yiu, M.L., Lo, E., Yung, D.: Authentication of moving KNN queries. In ICDE, pp. 565–576 (2011)
Yang, Y., Papadopoulos, S., Papadias, D.: Authenticated indexing for outsourced spatial databases. VLDB J. 18(3), 631–648 (2009)
Hu, H., Xu, J., Chen, Q., Yang, Z.: Authenticating location-based services without compromising location privacy. In: ACM SIGMOD, pp. 301–312 (2012)
Zhang, R., Zhang, Y., Zhang, C.: Secure top-k query processing via untrusted location-based service providers. In: INFOCOM, pp. 1170–1178 (2012)
Chen, Q., Hu, H., Xu, J.: Authenticating top-k queries in location-based services with confidentiality. Proc. VLDB Endow. 7(1), 49–60 (2013)
Zhang, R., Sun, J., Zhang, Y., Zhang, C.: Secure spatial top-k query processing via untrusted location-based service providers. IEEE Trans. Dependable Secure Comput. 12(1), 111–124 (2015)
Yang, G., Cai, Y., Hu, Z.: Authentication of function queries. In: ICDE, pp. 337–348 (2016)
Zhu, X., Wu, J., Chang, W., Wang, G., Liu, Q.: Authentication of multi-dimensional top-k query on untrusted server. In: Proceedings of the IEEE/ACM International Symposium on Quality of Service (IWQoS) (2018)
Hu, L., Ku, W.-S., Bakiras, S., Shahabi, C.: Spatial query integrity with Voronoi neighbors. IEEE Trans. Knowl. Data Eng. 25(4), 863–876 (2013)
Yiu, M.L., Lin, Y., Mouratidis, K.: Efficient verification of shortest path search via authenticated hints. In: ICDE, pp. 237–248 (2010)
Lin, X., Xu, J., Hu, H.: Authentication of location-based skyline queries. In: Proceedings of the 20th ACM International Conference on Information and Knowledge Management, pp. 1583–1588 (2011)
Lin, X., Xu, J., Hu, H., Lee, W.-C.: Authenticating location-based skyline queries in arbitrary subspaces. IEEE Trans. Knowl. Data Eng. 26(6), 1479–1493 (2014)
Liu, Q., Wu, S., Pei, S., Wu, J., Peng, T., Wang, G.: Secure and efficient multi-attribute range queries based on comparable inner product encoding. In: 2018 IEEE Conference on Communications and Network Security (CNS), pp. 1–9. IEEE (2018)
Zhang, S., Wang, G., Bhuiyan, Md.Z.A., Liu, Q.: A dual privacy preserving scheme in continuous location-based services. IEEE Internet Things J. 5(5), 4191–4200 (2017)
Liu, Q., Wang, G., Li, F., Yang, S., Jie, W.: Preserving privacy with probabilistic indistinguishability in weighted social networks. IEEE Trans. Parallel Distrib. Syst. 28(5), 1417–1429 (2017)
Zhang, Q., Liu, Q., Wang, G.: PRMS: a personalized mobile search over encrypted outsourced data. IEEE Access 6, 31541–31552 (2018)
Zhu, X., Liu, Q., Wang, G.: A novel verifiable and dynamic fuzzy keyword search scheme over encrypted data in cloud computing. In: Trustcom/BigdataSE/ISPA, pp. 845–851 (2017)
Liu, Q., Wang, G., Liu, X., Peng, T., Wu, J.: Achieving reliable and secure services in cloud computing environments. Comput. Electric. Eng. 59, 153–164 (2016)
Zheng, H., Chang, W., Wu, J.: Coverage and distinguishability requirements for traffic flow monitoring systems. In: IEEE/ACM 24th International Symposium on Quality of Service, pp. 1–10 (2016)
Chang, W., Wu, J.: Progressive or conservative: rationally allocate cooperative work in mobile social networks. IEEE Trans. Parallel Distrib. Syst. 26(7), 2020–2035 (2015)
Lo, H., Ghinita, G.: Authenticating spatial skyline queries with low communication overhead. In: Proceedings of the third ACM Conference on Data and Application Security and Privacy, pp. 177–180 (2013)
Acknowledgments
This work is supported in part by the National Natural Science Foundation of China under Grants 61632009 & 61472451, in part by the Guangdong Provincial Natural Science Foundation under Grant 2017A030308006 and High-Level Talents Program of Higher Education in Guangdong Province under Grant 2016ZJ01, in part by NSF and CSC grants CNS 1629746, CNS 1564128, CNS 1449860, CNS 1461932, CNS 1460971, CNS 1439672, in part by the China Scholarship Council under Grant 201606370141, in part by Hunan Provincial Natural Science Foundation 2017JJ2333.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhu, X., Wu, J., Chang, W., Wang, G., Liu, Q. (2018). Authentication of Skyline Query over Road Networks. In: Wang, G., Chen, J., Yang, L. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2018. Lecture Notes in Computer Science(), vol 11342. Springer, Cham. https://doi.org/10.1007/978-3-030-05345-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-05345-1_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-05344-4
Online ISBN: 978-3-030-05345-1
eBook Packages: Computer ScienceComputer Science (R0)