Authenticating Top-k Queries in Location-based Services with Confidentiality

Qian Chen*, Haibo HU, Jianliang XU

*Corresponding author for this work

Research output: Contribution to journalConference articlepeer-review

53 Citations (Scopus)

Abstract

State-of-the-art location-based services (LBSs) involve data owners, requesting clients, and service providers. As LBSs become new business opportunities, there is an increasing necessity to verifythe genuineness of service results. Unfor-tunately, while traditional query authentication techniques can address this issue, they fail to protect the confidentiality of data, which is sensitive location information when LBSs are concerned. Recent work has studied how to preserve such location privacyin query authentication. However, the prior work is limited to range queries, where private values only appear on one side of the range comparison. In this pa-per, we address the more challenging authentication prob-lem on top-k queries, where private values appear on both sides of a comparison. To start with, we propose two novel cryptographic building blocks, followed by a comprehensive design of authentication schemes for top-k queries based on R-tree and Power Diagram indexes. Optimizations, security analysis, and experimental results consistently show the ef-fectiveness and robustness of theproposed schemes under various system settings and query workloads.

Original languageEnglish
Pages (from-to)49-60
Number of pages12
JournalProceedings of the VLDB Endowment
Volume7
Issue number1
DOIs
Publication statusPublished - Sept 2013
EventProceedings of the 40th International Conference on Very Large Data Bases, VLDB 2014 - Hangzhou, China
Duration: 1 Sept 20145 Sept 2014

Scopus Subject Areas

  • Computer Science (miscellaneous)
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Authenticating Top-k Queries in Location-based Services with Confidentiality'. Together they form a unique fingerprint.

Cite this