Authentication of Skyline Query over Road Networks

  • Xiaoyu Zhu
  • Jie Wu
  • Wei Chang
  • Guojun WangEmail author
  • Qin Liu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11342)


With the increase of location-aware and Internet-capable mobile handset devices, location-based services (LBSs) have experienced an explosive growth in recent years. To scale up services, location-based service providers (LBSPs) outsource data management to third-party cloud service providers (CSPs), which in turn provide data query services to users on behalf of LBSPs. However, the CSPs cannot be trusted, which may return incorrect or incomplete query results to users, intentionally or not. Skyline query is an important kind of query, which asks for the data that is not spatially dominated by any other data. Therefore, enabling users to authenticate skyline query results is essential for outsourced LBSs. In this paper, we propose an authentication solution to support location-based skyline query. By embedding each data with its skyline neighbors in the data’s signature, our solution allows users to efficiently verify the soundness and completeness of location-based skyline query results. Through theoretical analysis, we demonstrate the effectiveness of our proposed solution.


Data outsourcing Query authentication Skyline query LBSP Road network 



This work is supported in part by the National Natural Science Foundation of China under Grants 61632009 & 61472451, in part by the Guangdong Provincial Natural Science Foundation under Grant 2017A030308006 and High-Level Talents Program of Higher Education in Guangdong Province under Grant 2016ZJ01, in part by NSF and CSC grants CNS 1629746, CNS 1564128, CNS 1449860, CNS 1461932, CNS 1460971, CNS 1439672, in part by the China Scholarship Council under Grant 201606370141, in part by Hunan Provincial Natural Science Foundation 2017JJ2333.


  1. 1.
    Zheng, B., Lee, K.C.K., Lee, W.-C.: Location-dependent skyline query. In: Proceedings of the 9th International Conference on Mobile Data Management, pp. 148–155 (2008)Google Scholar
  2. 2.
    Lee, K.C.K.: Efficient evaluation of location-dependent skyline queries using non-dominance scopes. In: Proceedings of the 2nd International Conference on Computing for Geospatial Research & Applications, p. 14 (2011)Google Scholar
  3. 3.
    Goncalves, M., Torres, D., Perera, G.: Making recommendations using location-based skyline queries. In: Proceedings of the 23rd International Workshop on Database and Expert Systems Applications (DEXA), pp. 111–115 (2012)Google Scholar
  4. 4.
    Chen, W., Liu, M., Zhang, R., Zhang, Y., Liu, S.: Secure outsourced skyline query processing via untrusted cloud service providers. In INFOCOM, pp. 1–9 (2016)Google Scholar
  5. 5.
    Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.G.: Authentic data publication over the internet. J. Comput. Secur. 11(3), 291–314 (2003)CrossRefGoogle Scholar
  6. 6.
    Pang, H.H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying completeness of relational query results in data publishing. In: ACM SIGMOD, pp. 407–418 (2005)Google Scholar
  7. 7.
    Ku, W.-S., Hu, L., Shahabi, C., Wang, H.: Query integrity assurance of location-based services accessing outsourced spatial databases. In: Mamoulis, N., Seidl, T., Pedersen, T.B., Torp, K., Assent, I. (eds.) SSTD 2009. LNCS, vol. 5644, pp. 80–97. Springer, Heidelberg (2009). Scholar
  8. 8.
    Yiu, M.L., Lo, E., Yung, D.: Authentication of moving KNN queries. In ICDE, pp. 565–576 (2011)Google Scholar
  9. 9.
    Yang, Y., Papadopoulos, S., Papadias, D.: Authenticated indexing for outsourced spatial databases. VLDB J. 18(3), 631–648 (2009)CrossRefGoogle Scholar
  10. 10.
    Hu, H., Xu, J., Chen, Q., Yang, Z.: Authenticating location-based services without compromising location privacy. In: ACM SIGMOD, pp. 301–312 (2012)Google Scholar
  11. 11.
    Zhang, R., Zhang, Y., Zhang, C.: Secure top-k query processing via untrusted location-based service providers. In: INFOCOM, pp. 1170–1178 (2012)Google Scholar
  12. 12.
    Chen, Q., Hu, H., Xu, J.: Authenticating top-k queries in location-based services with confidentiality. Proc. VLDB Endow. 7(1), 49–60 (2013)CrossRefGoogle Scholar
  13. 13.
    Zhang, R., Sun, J., Zhang, Y., Zhang, C.: Secure spatial top-k query processing via untrusted location-based service providers. IEEE Trans. Dependable Secure Comput. 12(1), 111–124 (2015)CrossRefGoogle Scholar
  14. 14.
    Yang, G., Cai, Y., Hu, Z.: Authentication of function queries. In: ICDE, pp. 337–348 (2016)Google Scholar
  15. 15.
    Zhu, X., Wu, J., Chang, W., Wang, G., Liu, Q.: Authentication of multi-dimensional top-k query on untrusted server. In: Proceedings of the IEEE/ACM International Symposium on Quality of Service (IWQoS) (2018)Google Scholar
  16. 16.
    Hu, L., Ku, W.-S., Bakiras, S., Shahabi, C.: Spatial query integrity with Voronoi neighbors. IEEE Trans. Knowl. Data Eng. 25(4), 863–876 (2013)CrossRefGoogle Scholar
  17. 17.
    Yiu, M.L., Lin, Y., Mouratidis, K.: Efficient verification of shortest path search via authenticated hints. In: ICDE, pp. 237–248 (2010)Google Scholar
  18. 18.
    Lin, X., Xu, J., Hu, H.: Authentication of location-based skyline queries. In: Proceedings of the 20th ACM International Conference on Information and Knowledge Management, pp. 1583–1588 (2011)Google Scholar
  19. 19.
    Lin, X., Xu, J., Hu, H., Lee, W.-C.: Authenticating location-based skyline queries in arbitrary subspaces. IEEE Trans. Knowl. Data Eng. 26(6), 1479–1493 (2014)CrossRefGoogle Scholar
  20. 20.
    Liu, Q., Wu, S., Pei, S., Wu, J., Peng, T., Wang, G.: Secure and efficient multi-attribute range queries based on comparable inner product encoding. In: 2018 IEEE Conference on Communications and Network Security (CNS), pp. 1–9. IEEE (2018)Google Scholar
  21. 21.
    Zhang, S., Wang, G., Bhuiyan, Md.Z.A., Liu, Q.: A dual privacy preserving scheme in continuous location-based services. IEEE Internet Things J. 5(5), 4191–4200 (2017)Google Scholar
  22. 22.
    Liu, Q., Wang, G., Li, F., Yang, S., Jie, W.: Preserving privacy with probabilistic indistinguishability in weighted social networks. IEEE Trans. Parallel Distrib. Syst. 28(5), 1417–1429 (2017)CrossRefGoogle Scholar
  23. 23.
    Zhang, Q., Liu, Q., Wang, G.: PRMS: a personalized mobile search over encrypted outsourced data. IEEE Access 6, 31541–31552 (2018)CrossRefGoogle Scholar
  24. 24.
    Zhu, X., Liu, Q., Wang, G.: A novel verifiable and dynamic fuzzy keyword search scheme over encrypted data in cloud computing. In: Trustcom/BigdataSE/ISPA, pp. 845–851 (2017)Google Scholar
  25. 25.
    Liu, Q., Wang, G., Liu, X., Peng, T., Wu, J.: Achieving reliable and secure services in cloud computing environments. Comput. Electric. Eng. 59, 153–164 (2016)CrossRefGoogle Scholar
  26. 26.
    Zheng, H., Chang, W., Wu, J.: Coverage and distinguishability requirements for traffic flow monitoring systems. In: IEEE/ACM 24th International Symposium on Quality of Service, pp. 1–10 (2016)Google Scholar
  27. 27.
    Chang, W., Wu, J.: Progressive or conservative: rationally allocate cooperative work in mobile social networks. IEEE Trans. Parallel Distrib. Syst. 26(7), 2020–2035 (2015)CrossRefGoogle Scholar
  28. 28.
    Lo, H., Ghinita, G.: Authenticating spatial skyline queries with low communication overhead. In: Proceedings of the third ACM Conference on Data and Application Security and Privacy, pp. 177–180 (2013)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Xiaoyu Zhu
    • 1
  • Jie Wu
    • 2
  • Wei Chang
    • 3
  • Guojun Wang
    • 4
    Email author
  • Qin Liu
    • 5
  1. 1.School of Information Science and EngineeringCentral South UniversityChangshaChina
  2. 2.Center for Networked ComputingTemple UniversityPhiladelphiaUSA
  3. 3.Department of Computer ScienceSaint Joseph’s UniversityPhiladelphiaUSA
  4. 4.School of Computer Science and TechnologyGuangzhou UniversityGuangzhouChina
  5. 5.School of Computer Science and Electronic EngineeringHunan UniversityChangshaChina

Personalised recommendations