Skip to main content
Top
Published in: World Wide Web 2/2019

06-12-2017

A resource-aware approach for authenticating privacy preserving GNN queries

Authors: Yan Dai, Jie Shao, Gang Hu, Long Guo

Published in: World Wide Web | Issue 2/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Nowadays many location service providers (LSPs) employ spatial databases outsourced from a third-party data owner (DO) to answer various users’ queries, e.g., group nearest neighbor (GNN) queries that enable a group of users to find a meeting place minimizing their aggregate travel distance. Along with the benefits from LSPs and DO, protection of location privacy and authentication of query results become two major concerns for users while assessing GNN queries. This paper proposes a resource-aware approach that supports effective location privacy preservation and efficient query result authentication with a less storage, communication and computation overhead. Specifically, two centroid-based techniques are investigated to generate a centroid point, which initiates GNN query on behalf of the group members. Then, an authentication algorithm based on Voronoi diagram is proposed for spatial queries. Finally, we demonstrate how our approach is resistant to various attacks, and evaluate its performance by comparing with three competitive approaches. The results show the proposed approach is better and more economical in terms of resource overhead, while considering both privacy preservation and query authentication.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Andrés, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-Indistinguishability: differential privacy for location-based systems. In: SIGSAC, pp 901–914 (2013) Andrés, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-Indistinguishability: differential privacy for location-based systems. In: SIGSAC, pp 901–914 (2013)
2.
go back to reference Ashouri-Talouki, M., Baraani-Dastjerdi, A., Selçuk, A.A.: GLP: a cryptographic approach for group location privacy. Comput. Commun. 35(12), 1527–1533 (2012)CrossRef Ashouri-Talouki, M., Baraani-Dastjerdi, A., Selçuk, A.A.: GLP: a cryptographic approach for group location privacy. Comput. Commun. 35(12), 1527–1533 (2012)CrossRef
3.
go back to reference Ashouri-Talouki, M., Baraani-Dastjerdi, A., Selçuk, A.A.: The cloaked-centroid protocol: location privacy protection for a group of users of location-based services. Knowl. Inf. Syst. 45(3), 589–615 (2015)CrossRef Ashouri-Talouki, M., Baraani-Dastjerdi, A., Selçuk, A.A.: The cloaked-centroid protocol: location privacy protection for a group of users of location-based services. Knowl. Inf. Syst. 45(3), 589–615 (2015)CrossRef
4.
go back to reference Chen, Q., Hu, H., Xu, J.: Authenticating top-k queries in location-based services with confidentiality. PVLDB 7(1), 49–60 (2013) Chen, Q., Hu, H., Xu, J.: Authenticating top-k queries in location-based services with confidentiality. PVLDB 7(1), 49–60 (2013)
5.
go back to reference Fu, Z., Shu, J., Wang, J., Liu, Y., Lee, S.: Privacy-preserving smart similarity search based on simhash over encrypted data in cloud computing. J. Internet Technol. 16(3), 453–460 (2015) Fu, Z., Shu, J., Wang, J., Liu, Y., Lee, S.: Privacy-preserving smart similarity search based on simhash over encrypted data in cloud computing. J. Internet Technol. 16(3), 453–460 (2015)
6.
go back to reference Gedik, B., Liu, L.: Location privacy in mobile systems: a personalized anonymization model. In: ICDCS, pp 620–629 (2005) Gedik, B., Liu, L.: Location privacy in mobile systems: a personalized anonymization model. In: ICDCS, pp 620–629 (2005)
7.
go back to reference Ghinita, G., Kalnis, P., Skiadopoulos, S.: Mobihide: a mobilea peer-to-peer system for anonymous location-based queries. In: SSTD, pp 221–238 (2007) Ghinita, G., Kalnis, P., Skiadopoulos, S.: Mobihide: a mobilea peer-to-peer system for anonymous location-based queries. In: SSTD, pp 221–238 (2007)
8.
go back to reference Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.: Private queries in location based services: anonymizers are not necessary. In: SIGMOD, pp 121–132 (2008) Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.: Private queries in location based services: anonymizers are not necessary. In: SIGMOD, pp 121–132 (2008)
9.
go back to reference Hao, F., Zielinski, P.: The power of anonymous veto in public discussion. Trans. Computational Science 4, 41–52 (2009)MATH Hao, F., Zielinski, P.: The power of anonymous veto in public discussion. Trans. Computational Science 4, 41–52 (2009)MATH
10.
go back to reference Hashem, T., Kulik, L., Zhang, R.: Privacy Preserving Group Nearest Neighbor Queries. In: EDBT, pp 489–500 (2010) Hashem, T., Kulik, L., Zhang, R.: Privacy Preserving Group Nearest Neighbor Queries. In: EDBT, pp 489–500 (2010)
11.
go back to reference Hashem, T., Ali, M.E., Kulik, L., Tanin, E., Quattrone, A.: Protecting privacy for group nearest neighbor queries with crowdsourced data and computing. In: Ubicomp, pp 559–562 (2013) Hashem, T., Ali, M.E., Kulik, L., Tanin, E., Quattrone, A.: Protecting privacy for group nearest neighbor queries with crowdsourced data and computing. In: Ubicomp, pp 559–562 (2013)
12.
go back to reference Hashem, T., Datta, S., Islam, T.U., Ali, M.E., Kulik, L., Tanin, E.: A unified framework for authenticating privacy preserving location based services. In: Georich@SIGMOD 2015, pp 13–18 (2015) Hashem, T., Datta, S., Islam, T.U., Ali, M.E., Kulik, L., Tanin, E.: A unified framework for authenticating privacy preserving location based services. In: Georich@SIGMOD 2015, pp 13–18 (2015)
13.
go back to reference Hu, H., Xu, J.: Non-exposure location anonymity. In: ICDE, pp 1120–1131 (2009) Hu, H., Xu, J.: Non-exposure location anonymity. In: ICDE, pp 1120–1131 (2009)
14.
go back to reference Hu, H., Xu, J., Chen, Q., Yang, Z.: Authenticating location-based services without compromising location privacy. In: SIGMOD, pp 301–312 (2012) Hu, H., Xu, J., Chen, Q., Yang, Z.: Authenticating location-based services without compromising location privacy. In: SIGMOD, pp 301–312 (2012)
15.
go back to reference Hu, L., Ku, W., Bakiras, S., Shahabi, C.: Spatial query integrity with voronoi neighbors. IEEE Trans. Knowl. Data Eng. 25(4), 863–876 (2013)CrossRef Hu, L., Ku, W., Bakiras, S., Shahabi, C.: Spatial query integrity with voronoi neighbors. IEEE Trans. Knowl. Data Eng. 25(4), 863–876 (2013)CrossRef
16.
go back to reference Huang, Y., Vishwanathan, R.: Privacy preserving group nearest neighbour queries in location-based services using cryptographic techniques. In: GLOBECOM, pp 1–5 (2010) Huang, Y., Vishwanathan, R.: Privacy preserving group nearest neighbour queries in location-based services using cryptographic techniques. In: GLOBECOM, pp 1–5 (2010)
17.
go back to reference Khan, A.K.M.M.R., Hashem, T., Tanin, E., Kulik, L.: Location Oblivious Privacy Protection for Group Nearest Neighbor Queries. In: GIScience, pp 301–317 (2014) Khan, A.K.M.M.R., Hashem, T., Tanin, E., Kulik, L.: Location Oblivious Privacy Protection for Group Nearest Neighbor Queries. In: GIScience, pp 301–317 (2014)
18.
go back to reference Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: SSTD, pp 239–257 (2007) Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: SSTD, pp 239–257 (2007)
19.
go back to reference Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: ICPS, pp 88–97 (2005) Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: ICPS, pp 88–97 (2005)
20.
go back to reference Okabe, A., Satoh, T., Furuta, T., Suzuki, A., Okano, K.: Generalized network voronoi diagrams: concepts, computational methods, and applications. Int. J. Geogr. Inf. Sci. 22(9), 965–994 (2008)CrossRef Okabe, A., Satoh, T., Furuta, T., Suzuki, A., Okano, K.: Generalized network voronoi diagrams: concepts, computational methods, and applications. Int. J. Geogr. Inf. Sci. 22(9), 965–994 (2008)CrossRef
21.
go back to reference Paillier, P., Pointcheval, D.: Efficient public-key cryptosystems provably secure against active adversaries. In: ASIACRYPT, pp 165–179 (1999) Paillier, P., Pointcheval, D.: Efficient public-key cryptosystems provably secure against active adversaries. In: ASIACRYPT, pp 165–179 (1999)
22.
go back to reference Papadias, D., Shen, Q., Tao, Y., Mouratidis, K.: Group nearest neighbor queries. In: ICDE, pp 301–312 (2004) Papadias, D., Shen, Q., Tao, Y., Mouratidis, K.: Group nearest neighbor queries. In: ICDE, pp 301–312 (2004)
23.
go back to reference Papadopoulos, S., Yang, Y., Bakiras, S., Papadias, D.: Continuous spatial authentication. In: SSTD, pp. 62–79 (2009) Papadopoulos, S., Yang, Y., Bakiras, S., Papadias, D.: Continuous spatial authentication. In: SSTD, pp. 62–79 (2009)
24.
go back to reference Sadeghi, A., Visconti, I., Wachsmann, C.: Anonymizer-enabled security and privacy for RFID. In: CANS, pp 134–153 (2009) Sadeghi, A., Visconti, I., Wachsmann, C.: Anonymizer-enabled security and privacy for RFID. In: CANS, pp 134–153 (2009)
25.
go back to reference Sheikh, R., Mishra, D.K., Kumar, B.: Secure multiparty computation: from millionaires problem to anonymizer. Information Security Journal: A Global Perspective 20(1), 25–33 (2011) Sheikh, R., Mishra, D.K., Kumar, B.: Secure multiparty computation: from millionaires problem to anonymizer. Information Security Journal: A Global Perspective 20(1), 25–33 (2011)
27.
go back to reference Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W.: An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. 12(10), 2402–2415 (2017)CrossRef Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W.: An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. 12(10), 2402–2415 (2017)CrossRef
28.
go back to reference Song, J., Shen, H.T., Wang, J., Huang, Z., Sebe, N., Wang, J.: A distance-computation-free search scheme for binary code databases. IEEE Trans Multimedia 18(3), 484–495 (2016)CrossRef Song, J., Shen, H.T., Wang, J., Huang, Z., Sebe, N., Wang, J.: A distance-computation-free search scheme for binary code databases. IEEE Trans Multimedia 18(3), 484–495 (2016)CrossRef
29.
go back to reference Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowledge Based Syst. 10(5), 557–570 (2002)MathSciNetCrossRefMATH Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowledge Based Syst. 10(5), 557–570 (2002)MathSciNetCrossRefMATH
30.
go back to reference Um, J., Kim, Y., Lee, H., Jang, M., Chang, J.: k-nearest neighbor query processing algorithm for cloaking regions towards user privacy protection in location-based services. Journal of Systems Architecture - Embedded Systems Design 58(9), 354–371 (2012) Um, J., Kim, Y., Lee, H., Jang, M., Chang, J.: k-nearest neighbor query processing algorithm for cloaking regions towards user privacy protection in location-based services. Journal of Systems Architecture - Embedded Systems Design 58(9), 354–371 (2012)
31.
go back to reference Xu, S., Yang, W., Lau, F.C.M.: A visualization based approach for digital signature authentication. Comput. Graph. Forum 28(3), 935–942 (2009)CrossRef Xu, S., Yang, W., Lau, F.C.M.: A visualization based approach for digital signature authentication. Comput. Graph. Forum 28(3), 935–942 (2009)CrossRef
32.
go back to reference Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Authenticated indexing for outsourced spatial databases. VLDB J. 18(3), 631–648 (2009)CrossRef Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Authenticated indexing for outsourced spatial databases. VLDB J. 18(3), 631–648 (2009)CrossRef
33.
go back to reference Yiu, M.L., Ghinita, G., Jensen, C.S., Kalnis, P.: Enabling search services on outsourced private spatial data. VLDB J. 19(3), 363–384 (2010)CrossRef Yiu, M.L., Ghinita, G., Jensen, C.S., Kalnis, P.: Enabling search services on outsourced private spatial data. VLDB J. 19(3), 363–384 (2010)CrossRef
34.
go back to reference Zhu, X., Zhang, L., Huang, Z.: A sparse embedding and least variance encoding approach to hashing. IEEE Trans. Image Process. 23(9), 3737–3750 (2014)MathSciNetCrossRefMATH Zhu, X., Zhang, L., Huang, Z.: A sparse embedding and least variance encoding approach to hashing. IEEE Trans. Image Process. 23(9), 3737–3750 (2014)MathSciNetCrossRefMATH
Metadata
Title
A resource-aware approach for authenticating privacy preserving GNN queries
Authors
Yan Dai
Jie Shao
Gang Hu
Long Guo
Publication date
06-12-2017
Publisher
Springer US
Published in
World Wide Web / Issue 2/2019
Print ISSN: 1386-145X
Electronic ISSN: 1573-1413
DOI
https://doi.org/10.1007/s11280-017-0507-4

Other articles of this Issue 2/2019

World Wide Web 2/2019 Go to the issue

Premium Partner