메뉴 건너뛰기




Volumn , Issue , 2010, Pages 350-359

Verifying spatial queries using voronoi neighbors

Author keywords

Authentication; Location based services; Query integrity; Spatial database outsourcing

Indexed keywords

COMPUTATIONALLY EFFICIENT; DATA SETS; K-NEAREST NEIGHBORS; LOCATION-BASED SERVICES; MERKLE HASH TREE; NEIGHBORHOOD INFORMATION; QUERY INTEGRITY; QUERY RESULTS; RANGE QUERY; SMART PHONES; SPATIAL DATA; SPATIAL DATABASE; SPATIAL QUERIES; STATE-OF-THE-ART APPROACH; VORONOI; VORONOI DIAGRAMS;

EID: 78650610346     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1869790.1869839     Document Type: Conference Paper
Times cited : (26)

References (30)
  • 1
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • D. Boneh, B. Lynn, and H. Shacham. Short Signatures from the Weil Pairing. J. Cryptology, 17(4):297-319, 2004.
    • (2004) J. Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 2
    • 33746749406 scopus 로고    scopus 로고
    • Authenticating multi-dimensional query results in data publishing
    • W. Cheng, H. Pang, and K.-L. Tan. Authenticating Multi-dimensional Query Results in Data Publishing. In DBSec, pages 60-73, 2006.
    • (2006) DBSec , pp. 60-73
    • Cheng, W.1    Pang, H.2    Tan, K.-L.3
  • 3
    • 38049082193 scopus 로고    scopus 로고
    • Authenticating kNN query results in data publishing
    • W. Cheng and K.-L. Tan. Authenticating kNN Query Results in Data Publishing. In Secure Data Management, pages 47-63, 2007.
    • (2007) Secure Data Management , pp. 47-63
    • Cheng, W.1    Tan, K.-L.2
  • 4
    • 62749198172 scopus 로고    scopus 로고
    • Query assurance verification for outsourced multi-dimensional databases
    • W. Cheng and K.-L. Tan. Query assurance verification for outsourced multi-dimensional databases. Journal of Computer Security, 17(1):101-126, 2009.
    • (2009) Journal of Computer Security , vol.17 , Issue.1 , pp. 101-126
    • Cheng, W.1    Tan, K.-L.2
  • 5
    • 0013458877 scopus 로고    scopus 로고
    • Batch RSA
    • A. Fiat. Batch RSA. J. Cryptology, 10(2):75-88, 1997.
    • (1997) J. Cryptology , vol.10 , Issue.2 , pp. 75-88
    • Fiat, A.1
  • 6
    • 0021615874 scopus 로고
    • R-trees: A dynamic index structure for spatial searching
    • A. Guttman. R-Trees: A Dynamic Index Structure for Spatial Searching. In SIGMOD Conference, pages 47-57, 1984.
    • (1984) SIGMOD Conference , pp. 47-57
    • Guttman, A.1
  • 7
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provider model
    • H. Hacigümüs, B. R. Iyer, C. Li, and S. Mehrotra. Executing SQL over Encrypted Data in the Database-service-provider Model. In SIGMOD Conference, pages 216-227, 2002.
    • (2002) SIGMOD Conference , pp. 216-227
    • Hacigümüs, H.1    Iyer, B.R.2    Li, C.3    Mehrotra, S.4
  • 9
    • 0000701994 scopus 로고    scopus 로고
    • Distance browsing in spatial databases
    • G. R. Hjaltason and H. Samet. Distance Browsing in Spatial Databases. ACM Trans. Database Syst., 24(2):265-318, 1999.
    • (1999) ACM Trans. Database Syst. , vol.24 , Issue.2 , pp. 265-318
    • Hjaltason, G.R.1    Samet, H.2
  • 10
    • 84880209783 scopus 로고    scopus 로고
    • Java SE Security. http://java.sun.com/javase/technologies/security.
    • Java SE Security
  • 11
    • 85117329200 scopus 로고    scopus 로고
    • Voronoi-based K nearest neighbor search for spatial network databases
    • M. R. Kolahdouzan and C. Shahabi. Voronoi-Based K Nearest Neighbor Search for Spatial Network Databases. In VLDB, pages 840-851, 2004.
    • (2004) VLDB , pp. 840-851
    • Kolahdouzan, M.R.1    Shahabi, C.2
  • 12
    • 70350359443 scopus 로고    scopus 로고
    • Query integrity assurance of location-based services accessing outsourced spatial databases
    • W.-S. Ku, L. Hu, C. Shahabi, and H. Wang. Query integrity assurance of location-based services accessing outsourced spatial databases. In SSTD, pages 80-97, 2009.
    • (2009) SSTD , pp. 80-97
    • Ku, W.-S.1    Hu, L.2    Shahabi, C.3    Wang, H.4
  • 13
    • 34250630995 scopus 로고    scopus 로고
    • Dynamic authenticated index structures for outsourced databases
    • F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin. Dynamic Authenticated Index Structures for Outsourced Databases. In SIGMOD Conference, pages 121-132, 2006.
    • (2006) SIGMOD Conference , pp. 121-132
    • Li, F.1    Hadjieleftheriou, M.2    Kollios, G.3    Reyzin, L.4
  • 14
    • 58149462240 scopus 로고    scopus 로고
    • Partially materialized digest scheme: An efficient verification method for outsourced databases
    • K. Mouratidis, D. Sacharidis, and H. Pang. Partially Materialized Digest Scheme: An Efficient Verification Method for Outsourced Databases. VLDB J., 18(1):363-381, 2009.
    • (2009) VLDB J. , vol.18 , Issue.1 , pp. 363-381
    • Mouratidis, K.1    Sacharidis, D.2    Pang, H.3
  • 15
    • 24944520998 scopus 로고    scopus 로고
    • Authentication and integrity in outsourced databases
    • E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and Integrity in Outsourced Databases. In NDSS, 2004.
    • (2004) NDSS
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 16
    • 35048891654 scopus 로고    scopus 로고
    • Signature bouquets: Immutability for aggregated/condensed signatures
    • E. Mykletun, M. Narasimha, and G. Tsudik. Signature Bouquets: Immutability for Aggregated/Condensed Signatures. In ESORICS, pages 160-176, 2004.
    • (2004) ESORICS , pp. 160-176
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 17
    • 33747176236 scopus 로고    scopus 로고
    • Authentication and integrity in outsourced databases
    • E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and Integrity in Outsourced Databases. TOS, 2(2):107-138, 2006.
    • (2006) TOS , vol.2 , Issue.2 , pp. 107-138
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 18
    • 0742311715 scopus 로고    scopus 로고
    • Spatial tessellations: Concepts and applications of voronoi diagrams
    • Wiley, NYC, 2nd edition
    • A. Okabe, B. Boots, K. Sugihara, and S. N. Chiu. Spatial Tessellations: Concepts and Applications of Voronoi Diagrams. Probability and Statistics. Wiley, NYC, 2nd edition, 2000.
    • (2000) Probability and Statistics
    • Okabe, A.1    Boots, B.2    Sugihara, K.3    Chiu, S.N.4
  • 19
    • 29844457793 scopus 로고    scopus 로고
    • Verifying completeness of relational query results in data publishing
    • H. Pang, A. Jain, K. Ramamritham, and K.-L. Tan. Verifying Completeness of Relational Query Results in Data Publishing. In SIGMOD Conference, pages 407-418, 2005.
    • (2005) SIGMOD Conference , pp. 407-418
    • Pang, H.1    Jain, A.2    Ramamritham, K.3    Tan, K.-L.4
  • 20
    • 2442590644 scopus 로고    scopus 로고
    • Authenticating query results in edge computing
    • H. Pang and K.-L. Tan. Authenticating Query Results in Edge Computing. In ICDE, pages 560-571, 2004.
    • (2004) ICDE , pp. 560-571
    • Pang, H.1    Tan, K.-L.2
  • 21
    • 77952757644 scopus 로고    scopus 로고
    • Scalable verification for outsourced dynamic databases
    • H. Pang, J. Zhang, and K. Mouratidis. Scalable Verification for Outsourced Dynamic Databases. PVLDB, 2(1):802-813, 2009.
    • (2009) PVLDB , vol.2 , Issue.1 , pp. 802-813
    • Pang, H.1    Zhang, J.2    Mouratidis, K.3
  • 24
    • 78650614611 scopus 로고    scopus 로고
    • VoR-tree: R-trees with voronoi diagrams for efficient processing of spatial nearest neighbor queries
    • M. Sharifzadeh and C. Shahabi. VoR-tree: R-trees with Voronoi Diagrams for Efficient Processing of Spatial Nearest Neighbor Queries. PVLDB, 3(1), 2010.
    • (2010) PVLDB , vol.3 , Issue.1
    • Sharifzadeh, M.1    Shahabi, C.2
  • 25
    • 33745601730 scopus 로고    scopus 로고
    • Query execution assurance for outsourced databases
    • R. Sion. Query Execution Assurance for Outsourced Databases. In VLDB, pages 601-612, 2005.
    • (2005) VLDB , pp. 601-612
    • Sion, R.1
  • 27
    • 70349251911 scopus 로고    scopus 로고
    • Dual encryption for query integrity assurance
    • H. Wang, J. Yin, C.-S. Perng, and P. S. Yu. Dual Encryption for Query Integrity Assurance. In CIKM, pages 863-872, 2008.
    • (2008) CIKM , pp. 863-872
    • Wang, H.1    Yin, J.2    Perng, C.-S.3    Yu, P.S.4
  • 28
    • 84997556980 scopus 로고    scopus 로고
    • Integrity auditing of outsourced data
    • M. Xie, H. Wang, J. Yin, and X. Meng. Integrity Auditing of Outsourced Data. In VLDB, pages 782-793, 2007.
    • (2007) VLDB , pp. 782-793
    • Xie, M.1    Wang, H.2    Yin, J.3    Meng, X.4
  • 29
    • 52649150749 scopus 로고    scopus 로고
    • Spatial outsourcing for location-based services
    • Y. Yang, S. Papadopoulos, D. Papadias, and G. Kollios. Spatial Outsourcing for Location-based Services. In ICDE, pages 1082-1091, 2008.
    • (2008) ICDE , pp. 1082-1091
    • Yang, Y.1    Papadopoulos, S.2    Papadias, D.3    Kollios, G.4
  • 30
    • 67649510426 scopus 로고    scopus 로고
    • Authenticated indexing for outsourced spatial databases
    • Y. Yang, S. Papadopoulos, D. Papadias, and G. Kollios. Authenticated Indexing for Outsourced Spatial Databases. VLDB J., 18(3):631-648, 2009.
    • (2009) VLDB J. , vol.18 , Issue.3 , pp. 631-648
    • Yang, Y.1    Papadopoulos, S.2    Papadias, D.3    Kollios, G.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.