Skip to main content

Authentication of Reverse k Nearest Neighbor Query

  • Conference paper
  • First Online:
Database Systems for Advanced Applications (DASFAA 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9049))

Included in the following conference series:

Abstract

In outsourced spatial databases, the LBS provides query services to the clients on behalf of the data owner. However, the LBS provider is not always trustworthy and it may send incomplete or incorrect query results to the clients. Therefore, ensuring spatial query integrity is critical. In this paper, we propose efficient RkNN query verification techniques which utilize the influence zone to check the integrity of query results. The methods in this work aim to verify both monochromatic and bichromatic RkNN queries results. Specifically, our methods can gain efficient performance on verifying bichromatic RkNN query results. Extensive experiments on both real and synthetic datasets demonstrate the efficiency of our proposed authenticating methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cheema, M.A., Lin, X., Zhang, W., Zhang, Y.: Influence zone: efficiently processing reverse k nearest neighbors queries. In: 2011 IEEE 27th International Conference on Data Engineering (ICDE), pp. 577–588. IEEE (2011)

    Google Scholar 

  2. Cheema, M.A., Lin, X., Zhang, Y., Wang, W., Zhang, W.: Lazy updates: An efficient technique to continuously monitoring reverse knn. Proceedings of the VLDB Endowment 2(1), 1138–1149 (2009)

    Article  Google Scholar 

  3. Chen, Q., Hu, H., Xu, J.: Authenticating top-k queries in location-based services with confidentiality. Proc. of the VLDB Endowment 7(1), 49–60 (2014)

    Google Scholar 

  4. Hu, L., Ku, W.S., Bakiras, S., Shahabi, C.: Spatial query integrity with voronoi neighbors. IEEE Transactions on Knowledge and Data Engineering 25(4), 863–876 (2013)

    Article  Google Scholar 

  5. Jing, Y., Hu, L., Ku, W.S., Shahabi, C.: Authentication of k nearest neighbor query on road networks. IEEE Transactions on Knowledge and Data Engineering 26(6), 1494–1506 (2014)

    Article  Google Scholar 

  6. Korn, F., Muthukrishnan, S.: Influence sets based on reverse nearest neighbor queries. In: ACM SIGMOD Record, vol. 29, pp. 201–212. ACM (2000)

    Google Scholar 

  7. Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, pp. 121–132. ACM (2006)

    Google Scholar 

  8. Lin, X., Xu, J., Hu, H., Lee, W.C.: Authenticating location-based skyline queries in arbitrary subspaces. IEEE Transactions on Knowledge and Data Engineering 26(6), 1479–1493 (2014)

    Article  Google Scholar 

  9. Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)

    Google Scholar 

  10. Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. ACM Transactions on Storage (TOS) 2(2), 107–138 (2006)

    Article  Google Scholar 

  11. Tao, Y., Papadias, D., Lian, X.: Reverse knn search in arbitrary dimensionality. In: Proceedings of the Thirtieth International Conference on Very Large Data Bases, vol. 30, pp. 744–755. VLDB Endowment (2004)

    Google Scholar 

  12. Wu, D., Choi, B., Xu, J., Jensen, C.: Authentication of Moving Top-k Spatial Keyword Queries (to appear) (2014)

    Google Scholar 

  13. Wu, W., Yang, F., Chan, C.Y., Tan, K.L.: Continuous reverse k-nearest-neighbor monitoring. In: 9th International Conference on Mobile Data Management, MDM 2008, pp. 132–139. IEEE (2008)

    Google Scholar 

  14. Wu, W., Yang, F., Chan, C.Y., Tan, K.L.: Finch: Evaluating reverse k-nearest-neighbor queries on location data. Proceedings of the VLDB Endowment 1(1), 1056–1067 (2008)

    Article  Google Scholar 

  15. Xie, M., Wang, H., Yin, J., Meng, X.: Integrity auditing of outsourced data. In: Proceedings of the 33rd International Conference on Very Large Data Bases, pp. 782–793. VLDB Endowment (2007)

    Google Scholar 

  16. Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Spatial outsourcing for location-based services. In: IEEE 24th International Conference on Data Engineering, ICDE 2008, pp. 1082–1091. IEEE (2008)

    Google Scholar 

  17. Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Authenticated indexing for outsourced spatial databases. The VLDB Journal, The International Journal on Very Large Data Bases 18(3), 631–648 (2009)

    Article  Google Scholar 

  18. Yiu, M.L., Lo, E., Yung, D.: Authentication of moving knn queries. In: 2011 IEEE 27th International Conference on Data Engineering (ICDE), pp. 565–576. IEEE (2011)

    Google Scholar 

  19. Yung, D., Lo, E., Yiu, M.L.: Authentication of moving range queries. In: Proceedings of the 21st ACM International Conference on Information and Knowledge Management, pp. 1372–1381. ACM (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Changyin Luo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Li, G., Luo, C., Li, J. (2015). Authentication of Reverse k Nearest Neighbor Query. In: Renz, M., Shahabi, C., Zhou, X., Cheema, M. (eds) Database Systems for Advanced Applications. DASFAA 2015. Lecture Notes in Computer Science(), vol 9049. Springer, Cham. https://doi.org/10.1007/978-3-319-18120-2_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-18120-2_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-18119-6

  • Online ISBN: 978-3-319-18120-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics