Continuous spatial authentication

Stavros Papadopoulos, Yin Yang, Spiridon Bakiras, Dimitris Papadias

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)

Abstract

Recent advances in wireless communications and positioning devices have generated a tremendous amount of interest in the continuous monitoring of spatial queries. However, such applications can incur a heavy burden on the data owner (DO), due to very frequent location updates. Database outsourcing is a viable solution, whereby the DO delegates its database functionality to a service provider (SP) that has the infrastructure and resources to handle the high workload. In this framework, authenticated query processing enables the clients to verify the correctness of the query results that are returned by the SP. In addition to correctness, the dynamic nature of the monitored data requires the provision for temporal completeness, i.e., the clients must be able to verify that there are no missing results in between data updates. This paper constitutes the first work that deals with the authentication of continuous spatial queries, focusing on ranges. We first introduce a baseline solution (BSL) that achieves correctness and temporal completeness, but incurs false transmissions; that is, the SP has to notify clients whenever there is a data update, even if it does not affect their results. Then, we propose CSA, a mechanism that minimizes the processing and transmission overhead through an elaborate indexing scheme and a virtual caching mechanism. Finally, we derive analytical models to optimize the performance of our methods, and evaluate their effectiveness through extensive experiments.

Original languageEnglish
Title of host publicationAdvances in Spatial and Temporal Databases - 11th International Symposium, SSTD 2009, Proceedings
Pages62-79
Number of pages18
Volume5644 LNCS
DOIs
Publication statusPublished - 2009
Externally publishedYes
Event11th International Symposium on Spatial and Temporal Databases, SSTD 2009 - Aalborg, Denmark
Duration: 8 Jul 200910 Jul 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5644 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other11th International Symposium on Spatial and Temporal Databases, SSTD 2009
CountryDenmark
CityAalborg
Period8/7/0910/7/09

Fingerprint

Authentication
Query processing
Outsourcing
Correctness
Update
Analytical models
Query
Completeness
Monitoring
Communication
Verify
Processing
Caching
Query Processing
Wireless Communication
Indexing
Experiments
Analytical Model
Positioning
Workload

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Papadopoulos, S., Yang, Y., Bakiras, S., & Papadias, D. (2009). Continuous spatial authentication. In Advances in Spatial and Temporal Databases - 11th International Symposium, SSTD 2009, Proceedings (Vol. 5644 LNCS, pp. 62-79). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5644 LNCS). https://doi.org/10.1007/978-3-642-02982-0_7

Continuous spatial authentication. / Papadopoulos, Stavros; Yang, Yin; Bakiras, Spiridon; Papadias, Dimitris.

Advances in Spatial and Temporal Databases - 11th International Symposium, SSTD 2009, Proceedings. Vol. 5644 LNCS 2009. p. 62-79 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5644 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Papadopoulos, S, Yang, Y, Bakiras, S & Papadias, D 2009, Continuous spatial authentication. in Advances in Spatial and Temporal Databases - 11th International Symposium, SSTD 2009, Proceedings. vol. 5644 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5644 LNCS, pp. 62-79, 11th International Symposium on Spatial and Temporal Databases, SSTD 2009, Aalborg, Denmark, 8/7/09. https://doi.org/10.1007/978-3-642-02982-0_7
Papadopoulos S, Yang Y, Bakiras S, Papadias D. Continuous spatial authentication. In Advances in Spatial and Temporal Databases - 11th International Symposium, SSTD 2009, Proceedings. Vol. 5644 LNCS. 2009. p. 62-79. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-642-02982-0_7
Papadopoulos, Stavros ; Yang, Yin ; Bakiras, Spiridon ; Papadias, Dimitris. / Continuous spatial authentication. Advances in Spatial and Temporal Databases - 11th International Symposium, SSTD 2009, Proceedings. Vol. 5644 LNCS 2009. pp. 62-79 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{c33175dbc2dc4bfd91a8bf93de1dd668,
title = "Continuous spatial authentication",
abstract = "Recent advances in wireless communications and positioning devices have generated a tremendous amount of interest in the continuous monitoring of spatial queries. However, such applications can incur a heavy burden on the data owner (DO), due to very frequent location updates. Database outsourcing is a viable solution, whereby the DO delegates its database functionality to a service provider (SP) that has the infrastructure and resources to handle the high workload. In this framework, authenticated query processing enables the clients to verify the correctness of the query results that are returned by the SP. In addition to correctness, the dynamic nature of the monitored data requires the provision for temporal completeness, i.e., the clients must be able to verify that there are no missing results in between data updates. This paper constitutes the first work that deals with the authentication of continuous spatial queries, focusing on ranges. We first introduce a baseline solution (BSL) that achieves correctness and temporal completeness, but incurs false transmissions; that is, the SP has to notify clients whenever there is a data update, even if it does not affect their results. Then, we propose CSA, a mechanism that minimizes the processing and transmission overhead through an elaborate indexing scheme and a virtual caching mechanism. Finally, we derive analytical models to optimize the performance of our methods, and evaluate their effectiveness through extensive experiments.",
author = "Stavros Papadopoulos and Yin Yang and Spiridon Bakiras and Dimitris Papadias",
year = "2009",
doi = "10.1007/978-3-642-02982-0_7",
language = "English",
isbn = "3642029817",
volume = "5644 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "62--79",
booktitle = "Advances in Spatial and Temporal Databases - 11th International Symposium, SSTD 2009, Proceedings",

}

TY - GEN

T1 - Continuous spatial authentication

AU - Papadopoulos, Stavros

AU - Yang, Yin

AU - Bakiras, Spiridon

AU - Papadias, Dimitris

PY - 2009

Y1 - 2009

N2 - Recent advances in wireless communications and positioning devices have generated a tremendous amount of interest in the continuous monitoring of spatial queries. However, such applications can incur a heavy burden on the data owner (DO), due to very frequent location updates. Database outsourcing is a viable solution, whereby the DO delegates its database functionality to a service provider (SP) that has the infrastructure and resources to handle the high workload. In this framework, authenticated query processing enables the clients to verify the correctness of the query results that are returned by the SP. In addition to correctness, the dynamic nature of the monitored data requires the provision for temporal completeness, i.e., the clients must be able to verify that there are no missing results in between data updates. This paper constitutes the first work that deals with the authentication of continuous spatial queries, focusing on ranges. We first introduce a baseline solution (BSL) that achieves correctness and temporal completeness, but incurs false transmissions; that is, the SP has to notify clients whenever there is a data update, even if it does not affect their results. Then, we propose CSA, a mechanism that minimizes the processing and transmission overhead through an elaborate indexing scheme and a virtual caching mechanism. Finally, we derive analytical models to optimize the performance of our methods, and evaluate their effectiveness through extensive experiments.

AB - Recent advances in wireless communications and positioning devices have generated a tremendous amount of interest in the continuous monitoring of spatial queries. However, such applications can incur a heavy burden on the data owner (DO), due to very frequent location updates. Database outsourcing is a viable solution, whereby the DO delegates its database functionality to a service provider (SP) that has the infrastructure and resources to handle the high workload. In this framework, authenticated query processing enables the clients to verify the correctness of the query results that are returned by the SP. In addition to correctness, the dynamic nature of the monitored data requires the provision for temporal completeness, i.e., the clients must be able to verify that there are no missing results in between data updates. This paper constitutes the first work that deals with the authentication of continuous spatial queries, focusing on ranges. We first introduce a baseline solution (BSL) that achieves correctness and temporal completeness, but incurs false transmissions; that is, the SP has to notify clients whenever there is a data update, even if it does not affect their results. Then, we propose CSA, a mechanism that minimizes the processing and transmission overhead through an elaborate indexing scheme and a virtual caching mechanism. Finally, we derive analytical models to optimize the performance of our methods, and evaluate their effectiveness through extensive experiments.

UR - http://www.scopus.com/inward/record.url?scp=70350362298&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=70350362298&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-02982-0_7

DO - 10.1007/978-3-642-02982-0_7

M3 - Conference contribution

SN - 3642029817

SN - 9783642029813

VL - 5644 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 62

EP - 79

BT - Advances in Spatial and Temporal Databases - 11th International Symposium, SSTD 2009, Proceedings

ER -