메뉴 건너뛰기




Volumn 19, Issue 3, 2010, Pages 363-384

Enabling search services on outsourced private spatial data

Author keywords

Data outsourcing; Spatial query processing

Indexed keywords

ECONOMIC AND SOCIAL EFFECTS; INVESTMENTS; LOCATION; QUERY LANGUAGES; QUERY PROCESSING;

EID: 77953139328     PISSN: 10668888     EISSN: 0949877X     Source Type: Journal    
DOI: 10.1007/s00778-009-0169-7     Document Type: Article
Times cited : (100)

References (38)
  • 1
    • 77953131105 scopus 로고    scopus 로고
    • Advanced Encryption Standard (AES): NIST-Federal Information Processing Standards Publication 197, Nov (2001)
    • Advanced Encryption Standard (AES): NIST-Federal Information Processing Standards Publication 197, Nov (2001).
  • 3
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data mining
    • Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: SIGMOD (2000).
    • (2000) SIGMOD
    • Agrawal, R.1    Srikant, R.2
  • 4
    • 0039301636 scopus 로고    scopus 로고
    • A cost model for query processing in high-dimensional data spaces
    • Böhm C.: A cost model for query processing in high-dimensional data spaces. ACM TODS 25(2), 129-178 (2000).
    • (2000) ACM TODS , vol.25 , Issue.2 , pp. 129-178
    • Böhm, C.1
  • 5
    • 0036606530 scopus 로고    scopus 로고
    • A framework for generating network-based moving objects
    • Brinkhoff T.: A framework for generating network-based moving objects. GeoInformatica 6(2), 153-180 (2002).
    • (2002) GeoInformatica , vol.6 , Issue.2 , pp. 153-180
    • Brinkhoff, T.1
  • 6
    • 0015050308 scopus 로고
    • Alternative algorithm for Hilbert's space-filling curve
    • Butz A. R.: Alternative algorithm for Hilbert's space-filling curve. IEEE Trans. Comput. C-20(4), 424-426 (1971).
    • (1971) IEEE Trans. Comput. , vol.C-20 , Issue.4 , pp. 424-426
    • Butz, A.R.1
  • 7
    • 52649097332 scopus 로고    scopus 로고
    • Authenticating multi-dimensional query results in data publishing
    • Cheng, W., Pang, H., Tan, K.-L.: Authenticating multi-dimensional query results in data publishing. In: DBSec (2006).
    • (2006) DBSec
    • Cheng, W.1    Pang, H.2    Tan, K.-L.3
  • 10
    • 70349305273 scopus 로고    scopus 로고
    • Differential privacy: A survey of results
    • Dwork, C.: Differential privacy: a survey of results. In: TAMC, pp. 1-19 (2008).
    • (2008) TAMC , pp. 1-19
    • Dwork, C.1
  • 11
    • 27944454864 scopus 로고    scopus 로고
    • Location privacy in mobile systems: A personalized anonymization model
    • Gedik, B., Liu, L.: Location privacy in mobile systems: a personalized anonymization model. In: ICDCS (2005).
    • (2005) ICDCS
    • Gedik, B.1    Liu, L.2
  • 12
    • 57149129292 scopus 로고    scopus 로고
    • Private queries in location based services: Anonymizers are not necessary
    • Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K. L.: Private queries in location based services: anonymizers are not necessary. In: SIGMOD (2008).
    • (2008) SIGMOD
    • Ghinita, G.1    Kalnis, P.2    Khoshgozaran, A.3    Shahabi, C.4    Tan, K.L.5
  • 13
    • 84988315609 scopus 로고    scopus 로고
    • Fast data anonymization with low information loss
    • Ghinita, G., Karras, P., Kalnis, P., Mamoulis, N.: Fast data anonymization with low information loss. In: VLDB (2007).
    • (2007) VLDB
    • Ghinita, G.1    Karras, P.2    Kalnis, P.3    Mamoulis, N.4
  • 14
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious rams
    • Goldreich O., Ostrovsky R.: Software protection and simulation on oblivious rams. J. ACM 43, 431-473 (1996).
    • (1996) J. ACM , vol.43 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 15
    • 1642286258 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: USENIX MobiSys (2003).
    • (2003) USENIX MobiSys
    • Gruteser, M.1    Grunwald, D.2
  • 16
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provider model
    • Hacigümüs, H., Iyer, B. R., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: SIGMOD (2002).
    • (2002) SIGMOD
    • Hacigümüs, H.1    Iyer, B.R.2    Li, C.3    Mehrotra, S.4
  • 18
    • 0000701994 scopus 로고    scopus 로고
    • Distance browsing in spatial databases
    • Hjaltason G. R., Samet H.: Distance browsing in spatial databases. TODS 24(2), 265-318 (1999).
    • (1999) Tods , vol.24 , Issue.2 , pp. 265-318
    • Hjaltason, G.R.1    Samet, H.2
  • 19
    • 35648982949 scopus 로고    scopus 로고
    • Preventing location-based identity inference in anonymous spatial queries
    • Kalnis P., Ghinita G., Mouratidis K., Papadias D.: Preventing location-based identity inference in anonymous spatial queries. IEEE TKDE 19(12), 1719-1733 (2007).
    • (2007) IEEE TKDE , vol.19 , Issue.12 , pp. 1719-1733
    • Kalnis, P.1    Ghinita, G.2    Mouratidis, K.3    Papadias, D.4
  • 20
    • 78149340011 scopus 로고    scopus 로고
    • On the privacy preserving properties of random data perturbation techniques
    • Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: ICDM (2003).
    • (2003) ICDM
    • Kargupta, H.1    Datta, S.2    Wang, Q.3    Sivakumar, K.4
  • 21
    • 57149125534 scopus 로고    scopus 로고
    • Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy
    • Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: SSTD (2007).
    • (2007) SSTD
    • Khoshgozaran, A.1    Shahabi, C.2
  • 23
    • 34548805858 scopus 로고    scopus 로고
    • t-Closeness: privacy beyond k-anonymity and l-diversity. In: ICDE (2007)
    • Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: privacy beyond k-anonymity and l-diversity. In: ICDE (2007).
    • Li, N.1    Li, T.2    Venkatasubramanian, S.3
  • 24
    • 31344447750 scopus 로고    scopus 로고
    • Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
    • Liu K., Kargupta H., Ryan J.: Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE TKDE 18(1), 92-106 (2006).
    • (2006) IEEE TKDE , vol.18 , Issue.1 , pp. 92-106
    • Liu, K.1    Kargupta, H.2    Ryan, J.3
  • 26
    • 77953135773 scopus 로고    scopus 로고
    • A certified digital signature. In: CRYPTO (1989)
    • Merkle, R. C.: A certified digital signature. In: CRYPTO (1989).
    • Merkle, R.C.1
  • 27
    • 77953138747 scopus 로고    scopus 로고
    • The new casper: query processing for location services without compromising privacy. In: VLDB (2006)
    • Mokbel, M. F., Chow, C.-Y., Aref, W. G.: The new casper: query processing for location services without compromising privacy. In: VLDB (2006).
    • Mokbel, M.F.1    Chow, C.-Y.2    Aref, W.G.3
  • 28
    • 84864173309 scopus 로고    scopus 로고
    • National Institute of Standards and Technology. Secure Hashing
    • National Institute of Standards and Technology. Secure Hashing. http://csrc. nist. gov/groups/ST/toolkit/secure_hashing. html.
  • 29
    • 85011095699 scopus 로고    scopus 로고
    • Time series compressibility and privacy. In: VLDB (2007)
    • Papadimitriou, S., Li, F., Kollios, G., Yu, P. S.: Time series compressibility and privacy. In: VLDB (2007).
    • Papadimitriou, S.1    Li, F.2    Kollios, G.3    Yu, P.S.4
  • 30
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • Samarati P.: Protecting respondents' identities in microdata release. IEEE TKDE 13(6), 1010-1027 (2001).
    • (2001) IEEE TKDE , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 31
    • 0036445714 scopus 로고    scopus 로고
    • GPRS traffic performance measurements. In: IEEE Vehicular Technology Conference (2002)
    • Stuckmann, P., Ehlers, N., Wouters, B.: GPRS traffic performance measurements. In: IEEE Vehicular Technology Conference (2002).
    • Stuckmann, P.1    Ehlers, N.2    Wouters, B.3
  • 32
    • 0029706786 scopus 로고    scopus 로고
    • A model for the prediction of R-tree performance. In: PODS (1996)
    • Theodoridis, Y., Sellis, T. K.: A model for the prediction of R-tree performance. In: PODS (1996).
    • Theodoridis, Y.1    Sellis, T.K.2
  • 33
    • 77953137338 scopus 로고    scopus 로고
    • A quantitative analysis and performance study for similarity-search methods in high-dimensional spaces. In: VLDB (1998)
    • Weber, R., Schek, H.-J., Blott, S.: A quantitative analysis and performance study for similarity-search methods in high-dimensional spaces. In: VLDB (1998).
    • Weber, R.1    Schek, H.-J.2    Blott, S.3
  • 35
    • 70849131456 scopus 로고    scopus 로고
    • Secure k-NN computation on encrypted databases. In: SIGMOD (2009)
    • Wong, W. K., Cheung, D. W., Kao, B., Mamoulis, N.: Secure k-NN computation on encrypted databases. In: SIGMOD (2009).
    • Wong, W.K.1    Cheung, D.W.2    Kao, B.3    Mamoulis, N.4
  • 36
    • 52649150749 scopus 로고    scopus 로고
    • Spatial outsourcing for location-based services. In: ICDE (2008)
    • Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Spatial outsourcing for location-based services. In: ICDE (2008).
    • Yang, Y.1    Papadopoulos, S.2    Papadias, D.3    Kollios, G.4
  • 37
    • 67649651664 scopus 로고    scopus 로고
    • Outsourcing search services on private spatial data. In: ICDE (2009)
    • Yiu, M. L., Ghinita, G., Jensen, C. S., Kalnis, P.: Outsourcing search services on private spatial data. In: ICDE (2009).
    • Yiu, M.L.1    Ghinita, G.2    Jensen, C.S.3    Kalnis, P.4
  • 38
    • 52649118020 scopus 로고    scopus 로고
    • SpaceTwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: ICDE (2008)
    • Yiu, M. L., Jensen, C. S., Huang, X., Lu, H.: SpaceTwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: ICDE (2008).
    • Yiu, M.L.1    Jensen, C.S.2    Huang, X.3    Lu, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.