Secure outsourced skyline query processing via untrusted cloud service providers

Recent years have witnessed a growing number of location-based service providers (LBSPs) outsourcing their points of interest (POI) datasets to third-party cloud service providers (CSPs), which in turn answer various data queries from mobile users on their behalf. A main challenge in such systems is that the CSPs cannot be fully trusted, which may return fake query results for various bad motives, e.g., in favor of POIs willing to pay. As an important type of queries, location-based skyline queries (LBSQs) ask for the POIs that are not spatially dominated by any other POI with respect to some query position. In this paper, we propose three novel schemes that enable efficient verification of any LBSQ result returned by an untrusted CSP by embedding and exploring a novel neighboring relationship among POIs. The efficacy and efficiency of our schemes are thoroughly analyzed and evaluated.

[1]  Cong Wang,et al.  Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.

[2]  Kyriakos Mouratidis,et al.  Efficient verification of shortest path search via authenticated hints , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).

[3]  Ming Li,et al.  Circular range search on encrypted spatial data , 2015, CNS.

[4]  Yin Yang,et al.  Authenticated indexing for outsourced spatial databases , 2009, The VLDB Journal.

[5]  Jianliang Xu,et al.  Authenticating location-based services without compromising location privacy , 2012, SIGMOD Conference.

[6]  Gene Tsudik,et al.  A Privacy-Preserving Index for Range Queries , 2004, VLDB.

[7]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[8]  Gabriel Ghinita,et al.  Authenticating spatial skyline queries with low communication overhead , 2013, CODASPY.

[9]  Yiwei Thomas Hou,et al.  Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[10]  Yiwei Thomas Hou,et al.  Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud , 2016, IEEE Transactions on Parallel and Distributed Systems.

[11]  Jianliang Xu,et al.  Authenticating Top-k Queries in Location-based Services with Confidentiality , 2013, Proc. VLDB Endow..

[12]  Yiwei Thomas Hou,et al.  Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[13]  Jianliang Xu,et al.  Authenticating Location-Based Skyline Queries in Arbitrary Subspaces , 2014, IEEE Transactions on Knowledge and Data Engineering.

[14]  Murat Kantarcioglu,et al.  Secure multidimensional range queries over outsourced data , 2012, The VLDB Journal.

[15]  Man Lung Yiu,et al.  Authentication of moving kNN queries , 2011, 2011 IEEE 27th International Conference on Data Engineering.

[16]  Hakan Hacigümüs,et al.  Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.

[17]  Ken C. K. Lee Efficient evaluation of location-dependent skyline queries using non-dominance scopes , 2011, COM.Geo.

[18]  Ken C. K. Lee,et al.  Location-Dependent Skyline Query , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).

[19]  Cong Wang,et al.  Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .

[20]  Jianliang Xu,et al.  Authentication of location-based skyline queries , 2011, CIKM '11.

[21]  Yiwei Thomas Hou,et al.  Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[22]  Elaine Shi,et al.  Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[23]  Chi Zhang,et al.  Secure top-k query processing via untrusted location-based service providers , 2012, 2012 Proceedings IEEE INFOCOM.

[24]  Yiwei Thomas Hou,et al.  Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[25]  Marlene Goncalves,et al.  Making Recommendations Using Location-Based Skyline Queries , 2012, 2012 23rd International Workshop on Database and Expert Systems Applications.

[26]  Chi Zhang,et al.  Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers , 2015, IEEE Transactions on Dependable and Secure Computing.

[27]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[28]  Cyrus Shahabi,et al.  Spatial Query Integrity with Voronoi Neighbors , 2013, IEEE Transactions on Knowledge and Data Engineering.