Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2016, Vol. 56 Issue (7) : 785-792     DOI: 10.16511/j.cnki.qhdxxb.2016.21.044
COMPUTER SCIENCE AND TECHNOLOGY |
Query authentications based on a fixed grid partitioning quad-tree index in LBS big data
NING Bo, PEI Xiaoxia, LI Yuju, PEI Xinyu
School of Information Science and Technology, Dalian Maritime University, Dalian 116026, China
Download: PDF(1374 KB)  
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks    
Abstract  When publishing data from location-based services (LBS), the data owner authorizes a third party publisher to be responsible for forwarding the appropriate result to the mobile clients. However, the service provider in the LBS big data may be susceptible to attacks which may lead to garbled or incorrect query results that can have commercial interest. This paper describes a quad-tree indexing structure based on a fixed grid partitioning mechanism for spatial range query authentication that partitions and indexes the spatial data. The position of an object in the LBS big data changes with time, so the data requires a dynamic index structure that can deal with many update operations. The spatial index structure presented here to update the price has low overhead, is convenient for data management systems, shortens the retrieval time for range queries, and uses a quad-tree index for high query efficiencies. The system ensures the authenticity, completeness and correctness of the query results. Tests show that this method is effective.
Keywords location-based service      query authentication      quad-tree      privacy preservation      big data     
ZTFLH:  TP309.2  
Issue Date: 15 July 2016
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
NING Bo
PEI Xiaoxia
LI Yuju
PEI Xinyu
Cite this article:   
NING Bo,PEI Xiaoxia,LI Yuju, et al. Query authentications based on a fixed grid partitioning quad-tree index in LBS big data[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(7): 785-792.
URL:  
http://jst.tsinghuajournals.com/EN/10.16511/j.cnki.qhdxxb.2016.21.044     OR     http://jst.tsinghuajournals.com/EN/Y2016/V56/I7/785
  
  
  
  
  
  
  
  
  
  
  
[1] Li F, Hadjieleftheriou M, Kollios G, et al. Dynamic authenticated index structures for outsourced databases[C]//Proceedings of the 2006 ACM SIGMOD international conference of data. Chicago, IL, USA:ACM, 2006:121-132.
[2] Hu H, Xu J, Chen Q, et al. Authenticating location-based services without compromising location privacy[C]//Proceedings of the 2012 ACM SIGMOD International Conference of Data. New York, NY, USA:ACM, 2012:301-312.
[3] Guttman A. R-trees:A Dynamic Index Structure for Spatial Searching[M]. ACM, 1984.
[4] Finkel R A, Bentley J L. Quad trees a data structure for retrieval on composite keys[J]. Acta informatica, 1974, 4(1):1-9.
[5] Xie M, Wang H, Yin J, et al. Integrity auditing of outsourced data[C]//Proceedings of the 33rd international conference on Very large data bases. Vienna, Austria:VLDB Endowment, 2007:782-793.
[6] 范红, 冯登国, 邹良惠. 数字签名技术及其在网络通信安全中的应用[J]. 中国科学院研究生院学报, 2001, 18(2):101-104. FAN Hong, FENG Dengguo, ZOU Lianghui. The digital signature technology and its application in the network communication security[J]. Graduate school of Chinese academy of sciences journal, 2001, 18(2):101-104.
[7] 卓先德, 赵菲, 曾德明. 非对称加密技术研究[J]. 四川理工学院学报:自然科学版, 2010, 23(5):562-564.ZHUO Xiande, ZHAO Fei, ZENG Deming. Authentication encryption technology research[J]. Journal of Sichuan University of Science and Engineering, 2010, 23(5):562-564.
[8] Narasimha M, Tsudik G. Authentication of outsourced databases using signature aggregation and chaining[C]//Database Systems for Advanced Applications. Jeju Island, Korea:Springer Berlin Heidelberg, 2006:420-436.
[9] Pang H H, Tan K L. Authenticating query results in edge computing[C]//Data Engineering, 2004. Proceedings of the 20th International Conference on. Chicago, IL, USA:IEEE, 2004:560-571.
[10] Merkle R C. A certified digital signature[C]//Advances in Cryptology-CRYPTO'89 Proceedings. New York, NY, USA:Springer, 1990:218-238.
[11] Yuan D, Wang X. Query authentication method based on merkle hash tree in outsourced database[J]. Computer Engineering, 2010, 36(4):115-117.
[12] Sion R. Query execution assurance for outsourced databases[C]//Proceedings of the 31st international conference on Very large data bases. Trondheim, Norway:VLDB Endowment, 2005:601-612.
[13] Mykletune, Naras Imuha M, Tsudik G. Authentication and integrity in outsourced databases[J]. ACM Transactions on Storage, 2006, 2(2):107-138.
[14] Lin X, Xu J, Hu H. Authentication of location-based skyline queries[C]//Proceedings of the 20th ACM international conference on Information and knowledge management. Glasgow, UK:ACM, 2011:1583-1588.
[15] Yiu M L, Lo E, Yung D. Authentication of moving kNN queries[C]//Data Engineering (ICDE), 2011 IEEE 27th International Conference on. IEEE, 2011:565-576.
[16] Hu H, Chen Q, Xu J. VERDICT:Privacy-preserving authentication of range queries in location-based services[C]//Data Engineering (ICDE), 2013 IEEE 29th International Conference on. IEEE, 2013:1312-1315.
[17] Jing Y, Hu L, Ku W S, et al. Authentication of k nearest neighbor query on road networks[J]. Knowledge and Data Engineering, IEEE Transactions on, 2014, 26(6):1494-1506.
[18] Wang J, Du X, Lu J, et al. Bucket-based authentication for outsourced databases[J]. Concurrency and Computation:Practice and Experience, 2010, 22(9):1160-1180.
[19] Samet H. The quadtree and related hierarchical data structures[J]. ACM Computing Surveys (CSUR), 1984, 16(2):187-260.
[20] Nievergelt J, Hinterberger H, Sevcik K C. The grid file:An adaptable, symmetric multikey file structures[J]. ACM Transactions on Database Systems (TODS), 1984, 9(1):38-71.
[1] FAN Xiaoliang, PENG Zhaopeng, ZHENG Chuanpan, WANG Cheng. Spatio-temporal correlation mining method for large-scale traffic networks[J]. Journal of Tsinghua University(Science and Technology), 2023, 63(9): 1317-1325.
[2] DING Guangyao, CHEN Qihang, XU Chen, QIAN Weining, ZHOU Aoying. Model sharing for GPU-accelerated DNN inference in big data processing systems[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(9): 1435-1441.
[3] WEI Zeyang, LIU Yi, WANG Chunyan, ZHANG Jia, BIAN Jiang, YAO Linjie, LIN Sijie, EWE Kaijie. Environmental computing: Concept, evolution, and challenges[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(12): 1839-1850.
[4] BA Rui, ZHANG Yudong, LIU Yi, ZHANG Hui. Three-layer and four-domainscenario analysis method and its application to urban complex disasters[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(10): 1579-1590.
[5] WANG Fei, LIU Jinfei, YIN Xishuang, TAN Yaosheng, ZHOU Tiangang, YANG Zhiyue, FENG Bo, YANG Xiaolong. Intelligent scheduling for high arch dams[J]. Journal of Tsinghua University(Science and Technology), 2021, 61(7): 756-767.
[6] ZHENG Menglei, TIAN Ling. Digital product twin modeling of massive dynamic data based on a time-series database[J]. Journal of Tsinghua University(Science and Technology), 2021, 61(11): 1281-1288.
[7] SHU Xueming, YAN Jun, HU Jun, WU Jinjin, DENG Boyu. Risk assessment model for building fires based on a Bayesian network[J]. Journal of Tsinghua University(Science and Technology), 2020, 60(4): 321-327.
[8] LI Zihao, TIAN Xiangliang, LI Zhongwen, ZHOU Wei, ZHOU Zhijie, ZHONG Maohua. Risk analysis of metro station passenger flow based on passenger flow patterns[J]. Journal of Tsinghua University(Science and Technology), 2019, 59(10): 854-860.
[9] XU Yuanchao, YANG Lu. Task scheduling on a many-core processor for high-volume throughput applications[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(3): 244-249.
[10] HONG Zhixu, CHEN Hao, CHENG Liang. Social governance data integration and decision analysis method based on big data[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(3): 264-269.
[11] MAN Dapeng, WANG Chenye, YANG Wu, WANG Wei, XUAN Shichang, JIN Xiaopeng. Energy-efficient cluster-based privacy data aggregation for wireless sensor networks[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(2): 213-219.
[12] SUN Zhiyuan, LU Huapu. Optimal traffic sensor layout model considering traffic big data[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(7): 743-750.
[13] YAN Surong, FENG Xiaoqing, LIAO Yixing. Matrix factorization based social recommender model[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(7): 793-800.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd