A data encryption scheme and GPU-based query processing algorithm for spatial data outsourcing

With the development of cloud computing, the interest on spatial database outsourcing has been increasing. Therefore, researches for protecting location data privacy in spatial outsourced databases have been actively performed. However, FDH (Flexible Distance-Based Hashing) is easy to access original data because they do not consider data distribution. In addition, since they perform the nearest neighbor query processing by using tree-based indexes, query processing time can be increased depending on tree depth. To solve these problems, we propose a bitmap encryption scheme and a query processing algorithm for spatial database outsourcing. We propose an anchor selection algorithm using a split and merge policy based on data distribution to protect privacy of users from attackers. In addition, we reduce the communication cost for query processing by using GPU processors. Finally, we show from performance analysis that the proposed scheme shows better query processing performance than the existing scheme, while the proposed scheme guarantees users' privacy.

[1]  Ling Liu,et al.  Preserving data privacy in outsourcing data aggregation services , 2007, TOIT.

[2]  Dimitris Sacharidis,et al.  K-anonymity in the Presence of External Databases , 2022 .

[3]  Jun Gao,et al.  Multiple Sensitive Association Protection in the Outsourced Database , 2010, DASFAA.

[4]  Roshni Thanka,et al.  A Survey on Security of Data outsourcing in Cloud , 2013 .

[5]  Panos Kalnis,et al.  Enabling search services on outsourced private spatial data , 2009, The VLDB Journal.

[6]  Panos Kalnis,et al.  Outsourced Similarity Search on Metric Data Assets , 2012, IEEE Transactions on Knowledge and Data Engineering.

[7]  Yin Yang,et al.  Spatial Outsourcing for Location-based Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[8]  Panos Kalnis,et al.  Outsourcing Search Services on Private Spatial Data , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[9]  Richard W. Hamming,et al.  Error detecting and error correcting codes , 1950 .

[10]  Yin Yang,et al.  Authenticated join processing in outsourced databases , 2009, SIGMOD Conference.

[11]  Andreas Gutscher Coordinate transformation - a solution for the privacy problem of location based services? , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[12]  Ling Liu,et al.  Sharoes: A Data Sharing Platform for Outsourced Enterprise Storage Environments , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[13]  Sushil Jajodia,et al.  Selective data outsourcing for enforcing privacy , 2011, J. Comput. Secur..

[14]  Pavel Zezula,et al.  M-tree: An Efficient Access Method for Similarity Search in Metric Spaces , 1997, VLDB.

[15]  Mudhakar Srivatsa,et al.  Search-as-a-service: Outsourced search over outsourced storage , 2009, TWEB.

[16]  Cyrus Shahabi,et al.  Private Buddy Search: Enabling Private Spatial Queries in Social Networks , 2009, 2009 International Conference on Computational Science and Engineering.

[17]  Amr El Abbadi,et al.  Dividing secrets to secure data outsourcing , 2014, Inf. Sci..