Skip to main content

A Spatial Transformation Scheme for Enhancing Privacy and Integrity of Outsourced Databases

  • Conference paper
Future Information Technology

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 309))

  • 2117 Accesses

Abstract

Outsourcing database is becoming a trend for spatial data owners to reduce the cost of managing and maintaining the database. However, the most important challenge in database outsourcing is how to meet privacy requirements and guarantee the integrity of the query result as well. To carry on both privacy and integrity for outsourced spatial data, we propose a spatial transformation scheme that makes use of shearing transformation with rotation shifting. From the performance evaluation, we show that our scheme has outstanding performance against different kinds of attack models and efficiently handles the query integrity of the query result sets.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yiu, M.L., Ghinita, G., Jensen, C.S., Kalnis, P.: Enabling search services on outsourced private spatial data. VLDB Journal 19(3), 363–384 (2010)

    Article  Google Scholar 

  2. Chen, K., Liu, L.: Geometric data perturbation for privacy preserving outsourced data mining. Knowledge and Information Systems 29(3), 657–695 (2011)

    Article  Google Scholar 

  3. Hacigumus, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service provider model. In: SIGMOD, Madison, pp. 216–227 (2002)

    Google Scholar 

  4. Hacigümüs, H., Mehrotra, S., Iyer, B.R.: Providing database as a service. In: ICDE, San Jose, pp. 29–38 (2002)

    Google Scholar 

  5. Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: SIGMOD, Dallas, pp. 439–450 (2000)

    Google Scholar 

  6. Oliveira, S.R.M., Zaiane, O.: Privacy preservation when sharing data for clustering. In: International Workshop on Secure Data Management in a Connected World, Toronto, pp. 67–82 (2004)

    Google Scholar 

  7. Chen, K., Liu, L.: A random rotation perturbation approach to privacy preserving data classification. Technical Report, Georgia Institute of Technology (2005)

    Google Scholar 

  8. Chen, K., Liu, L.: Geometric data perturbation for privacy preserving outsourced data mining. Knowledge and Information Systems 29(3), 657–695 (2011)

    Article  Google Scholar 

  9. Ku, W.-S., Hu, L., Shahabi, C., Wang, H.: Query integrity assurance of location-based services accessing outsourced spatial databases. In: Mamoulis, N., Seidl, T., Pedersen, T.B., Torp, K., Assent, I. (eds.) SSTD 2009. LNCS, vol. 5644, pp. 80–97. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  10. Liu, K., Kargupta, H., Ryan, J.: Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. TKDE 18, 92–106 (2010)

    Google Scholar 

  11. Advanced Encryption Standard (AES). NIST. Federal Information Processing Standards Publication 197 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hyeong-Il Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, HI., Youn, DN., Chang, JW. (2014). A Spatial Transformation Scheme for Enhancing Privacy and Integrity of Outsourced Databases. In: Park, J., Pan, Y., Kim, CS., Yang, Y. (eds) Future Information Technology. Lecture Notes in Electrical Engineering, vol 309. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55038-6_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-55038-6_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-55037-9

  • Online ISBN: 978-3-642-55038-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics