Verifying spatial queries using voronoi neighbors

Ling Hu, Wei Shinn Ku, Spiridon Bakiras, Cyrus Shahabi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

22 Citations (Scopus)

Abstract

With the popularity of location-based services and the abundant usage of smart phones and GPS enabled devices, the necessity of outsourcing spatial data has grown rapidly over the past few years. Nevertheless, in the database outsourcing paradigm, the authentication of the query results at the client remains a challenging problem. In this paper, we focus on the Outsourced Spatial Database (OSDB) model and propose an efficient scheme, called VN-Auth, that allows a client to verify the correctness and completeness of the result set. Our approach can handle both k nearest neighbor (kNN) and range queries, and is based on neighborhood information derived by the Voronoi diagram of the underlying spatial dataset. Specifically, upon receiving a query result, the client can verify its integrity by examining the signatures and exploring the neighborhood of every object in the result set. Compared to the current state-of-the-art approaches (i.e., methods based on Merkle hash trees), VN-Auth produces significantly smaller verification objects (VO) and is more computationally efficient, especially for queries with low selectivity.

Original languageEnglish
Title of host publication18th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2010
Pages350-359
Number of pages10
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event18th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2010 - San Jose, CA, United States
Duration: 2 Nov 20105 Nov 2010

Other

Other18th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2010
CountryUnited States
CitySan Jose, CA
Period2/11/105/11/10

Fingerprint

outsourcing
Voronoi
Outsourcing
Query
Location based services
spatial data
Authentication
Global positioning system
GPS
diagram
Verify
Spatial Database
Range Query
Voronoi Diagram
Spatial Data
Selectivity
Integrity
Completeness
Nearest Neighbor
Correctness

Keywords

  • Authentication
  • Location-based services
  • Query integrity
  • Spatial database outsourcing

ASJC Scopus subject areas

  • Earth-Surface Processes
  • Computer Science Applications
  • Modelling and Simulation
  • Computer Graphics and Computer-Aided Design
  • Information Systems

Cite this

Hu, L., Ku, W. S., Bakiras, S., & Shahabi, C. (2010). Verifying spatial queries using voronoi neighbors. In 18th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2010 (pp. 350-359) https://doi.org/10.1145/1869790.1869839

Verifying spatial queries using voronoi neighbors. / Hu, Ling; Ku, Wei Shinn; Bakiras, Spiridon; Shahabi, Cyrus.

18th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2010. 2010. p. 350-359.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hu, L, Ku, WS, Bakiras, S & Shahabi, C 2010, Verifying spatial queries using voronoi neighbors. in 18th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2010. pp. 350-359, 18th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2010, San Jose, CA, United States, 2/11/10. https://doi.org/10.1145/1869790.1869839
Hu L, Ku WS, Bakiras S, Shahabi C. Verifying spatial queries using voronoi neighbors. In 18th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2010. 2010. p. 350-359 https://doi.org/10.1145/1869790.1869839
Hu, Ling ; Ku, Wei Shinn ; Bakiras, Spiridon ; Shahabi, Cyrus. / Verifying spatial queries using voronoi neighbors. 18th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2010. 2010. pp. 350-359
@inproceedings{62dcb1c71d714ffdafa4a7f00881bed8,
title = "Verifying spatial queries using voronoi neighbors",
abstract = "With the popularity of location-based services and the abundant usage of smart phones and GPS enabled devices, the necessity of outsourcing spatial data has grown rapidly over the past few years. Nevertheless, in the database outsourcing paradigm, the authentication of the query results at the client remains a challenging problem. In this paper, we focus on the Outsourced Spatial Database (OSDB) model and propose an efficient scheme, called VN-Auth, that allows a client to verify the correctness and completeness of the result set. Our approach can handle both k nearest neighbor (kNN) and range queries, and is based on neighborhood information derived by the Voronoi diagram of the underlying spatial dataset. Specifically, upon receiving a query result, the client can verify its integrity by examining the signatures and exploring the neighborhood of every object in the result set. Compared to the current state-of-the-art approaches (i.e., methods based on Merkle hash trees), VN-Auth produces significantly smaller verification objects (VO) and is more computationally efficient, especially for queries with low selectivity.",
keywords = "Authentication, Location-based services, Query integrity, Spatial database outsourcing",
author = "Ling Hu and Ku, {Wei Shinn} and Spiridon Bakiras and Cyrus Shahabi",
year = "2010",
doi = "10.1145/1869790.1869839",
language = "English",
isbn = "9781450304283",
pages = "350--359",
booktitle = "18th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2010",

}

TY - GEN

T1 - Verifying spatial queries using voronoi neighbors

AU - Hu, Ling

AU - Ku, Wei Shinn

AU - Bakiras, Spiridon

AU - Shahabi, Cyrus

PY - 2010

Y1 - 2010

N2 - With the popularity of location-based services and the abundant usage of smart phones and GPS enabled devices, the necessity of outsourcing spatial data has grown rapidly over the past few years. Nevertheless, in the database outsourcing paradigm, the authentication of the query results at the client remains a challenging problem. In this paper, we focus on the Outsourced Spatial Database (OSDB) model and propose an efficient scheme, called VN-Auth, that allows a client to verify the correctness and completeness of the result set. Our approach can handle both k nearest neighbor (kNN) and range queries, and is based on neighborhood information derived by the Voronoi diagram of the underlying spatial dataset. Specifically, upon receiving a query result, the client can verify its integrity by examining the signatures and exploring the neighborhood of every object in the result set. Compared to the current state-of-the-art approaches (i.e., methods based on Merkle hash trees), VN-Auth produces significantly smaller verification objects (VO) and is more computationally efficient, especially for queries with low selectivity.

AB - With the popularity of location-based services and the abundant usage of smart phones and GPS enabled devices, the necessity of outsourcing spatial data has grown rapidly over the past few years. Nevertheless, in the database outsourcing paradigm, the authentication of the query results at the client remains a challenging problem. In this paper, we focus on the Outsourced Spatial Database (OSDB) model and propose an efficient scheme, called VN-Auth, that allows a client to verify the correctness and completeness of the result set. Our approach can handle both k nearest neighbor (kNN) and range queries, and is based on neighborhood information derived by the Voronoi diagram of the underlying spatial dataset. Specifically, upon receiving a query result, the client can verify its integrity by examining the signatures and exploring the neighborhood of every object in the result set. Compared to the current state-of-the-art approaches (i.e., methods based on Merkle hash trees), VN-Auth produces significantly smaller verification objects (VO) and is more computationally efficient, especially for queries with low selectivity.

KW - Authentication

KW - Location-based services

KW - Query integrity

KW - Spatial database outsourcing

UR - http://www.scopus.com/inward/record.url?scp=78650610346&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=78650610346&partnerID=8YFLogxK

U2 - 10.1145/1869790.1869839

DO - 10.1145/1869790.1869839

M3 - Conference contribution

AN - SCOPUS:78650610346

SN - 9781450304283

SP - 350

EP - 359

BT - 18th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2010

ER -