Authenticated Spatio-Textual Similarity Joins in Untrusted Cloud Environments

A spatio-textual similarity join searches a spatiotextual data collection and reports the object pairs that satisfy the specified spatial distance threshold and textual similarity threshold. However, when the data owner outsources the join computations to a third-party cloud service provider, the service provider may send incomplete or incorrect join results to the data owner. In this paper, we propose a pairwise authentication scheme, a cluster based scheme and an order and bound based scheme to authenticate the results of spatiotextual similarity joins. Extensive experiments on a real-world dataset verify the effectiveness and efficiency of our proposed schemes in terms of various performance metrics.

[1]  Jianliang Xu,et al.  Authentication of location-based skyline queries , 2011, CIKM '11.

[2]  Cyrus Shahabi,et al.  Spatial Query Integrity with Voronoi Neighbors , 2013, IEEE Transactions on Knowledge and Data Engineering.

[3]  Feifei Li,et al.  Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.

[4]  Feifei Li,et al.  Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams , 2007, VLDB.

[5]  Jianliang Xu,et al.  Authentication of Moving Top-k Spatial Keyword Queries , 2015, IEEE Transactions on Knowledge and Data Engineering.

[6]  Xiang Cheng,et al.  Authentication of Top-k Spatial Keyword Queries in Outsourced Databases , 2015, DASFAA.

[7]  Kyriakos Mouratidis,et al.  Efficient verification of shortest path search via authenticated hints , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).

[8]  Roberto J. Bayardo,et al.  Scaling up all pairs similarity search , 2007, WWW '07.

[9]  Surajit Chaudhuri,et al.  A Primitive Operator for Similarity Joins in Data Cleaning , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[10]  Hans-Peter Kriegel,et al.  The R*-tree: an efficient and robust access method for points and rectangles , 1990, SIGMOD '90.

[11]  Jeffrey Xu Yu,et al.  Efficient similarity joins for near-duplicate detection , 2011, TODS.

[12]  Jianliang Xu,et al.  Authenticating location-based services without compromising location privacy , 2012, SIGMOD Conference.

[13]  Jianliang Xu,et al.  Authenticating Top-k Queries in Location-based Services with Confidentiality , 2013, Proc. VLDB Endow..

[14]  Man Lung Yiu,et al.  Authentication of moving kNN queries , 2011, 2011 IEEE 27th International Conference on Data Engineering.

[15]  Chi Zhang,et al.  Secure top-k query processing via untrusted location-based service providers , 2012, 2012 Proceedings IEEE INFOCOM.

[16]  Stavros Papadopoulos,et al.  Lightweight authentication of linear algebraic queries on data streams , 2013, SIGMOD '13.

[17]  Yin Yang,et al.  Authenticated join processing in outsourced databases , 2009, SIGMOD Conference.

[18]  Man Lung Yiu,et al.  Authentication of moving range queries , 2012, CIKM '12.

[19]  Kyriakos Mouratidis,et al.  Authenticating the query results of text search engines , 2008, Proc. VLDB Endow..

[20]  Sunita Sarawagi,et al.  Efficient set joins on similarity predicates , 2004, SIGMOD '04.

[21]  Yin Yang,et al.  Spatial Outsourcing for Location-based Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[22]  Yin Yang,et al.  CADS: Continuous Authentication on Data Streams , 2007, VLDB.

[23]  Nikos Mamoulis,et al.  Spatio-textual similarity joins , 2012, Proc. VLDB Endow..

[24]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[25]  Jianjun Li,et al.  Authentication of Reverse k Nearest Neighbor Query , 2015, DASFAA.