Outsourcing spatial database to a third party is becoming a common practice for more and more individuals and
companies to save the cost of managing and maintaining database, where a data owner delegates its spatial data management
tasks to a third party and grants it to provide query services. However, the third party is not full trusted. Thus, authentication
information should be provided to the client for query authentication. In this paper, we introduce an efficient space
authenticated data structure, called Verifiable Similarity Indexing tree (VSS-tree), to support authenticated spatial query. We
build VSS-tree based on SS-tree which employs bounding sphere rather than bounding rectangle for region shape and extend it
with authentication information. Based on VSS-tree, the third party finds query results and builds their corresponding
verification object. The client performs query authentication using the verification object and the public key published. Finally,
we evaluate the performance and validity of our algorithms, the experiment results show that VSS-tree can efficiently support
spatial query and have better performance than Merkle R tree (MR-tree).
Cite this
Jun Hong1,2, Tao Wen2, and Quan Guo3 1School of Software, North University of China, China 2School of Computer Science and Engineering, Northeastern University, China 3Computer Science and Technology, Dalian Neusoft University of Information, China, "Query Authentication of Outsourced Spatial Database", The International Arab Journal of Information Technology (IAJIT) ,Volume 17, Number 04, pp. 107 - 115, July 2020, doi: 10.34028/iajit/17/4/12 .
@ARTICLE{2135,
author={Jun Hong1,2, Tao Wen2, and Quan Guo3 1School of Software, North University of China, China 2School of Computer Science and Engineering, Northeastern University, China 3Computer Science and Technology, Dalian Neusoft University of Information, China},
journal={The International Arab Journal of Information Technology (IAJIT)},
title={Query Authentication of Outsourced Spatial Database},
volume={17},
number={04},
pages={107 - 115},
doi={10.34028/iajit/17/4/12 },
year={1970}
}
TY - JOUR
TI - Query Authentication of Outsourced Spatial Database
T2 -
SP - 107
EP - 115
AU - Jun Hong1
AU - 2
AU - Tao Wen2
AU - and Quan Guo3 1School of Software
AU - North University of China
AU - China 2School of Computer Science and Engineering
AU - Northeastern University
AU - China 3Computer Science and Technology
AU - Dalian Neusoft University of Information
AU - China
DO - 10.34028/iajit/17/4/12
JO - The International Arab Journal of Information Technology (IAJIT)
IS - 9
SN - 2413-9351
VO - 17
VL - 17
JA -
Y1 - Jan 1970
ER -
PY - 1970
Jun Hong1,2, Tao Wen2, and Quan Guo3 1School of Software, North University of China, China 2School of Computer Science and Engineering, Northeastern University, China 3Computer Science and Technology, Dalian Neusoft University of Information, China, " Query Authentication of Outsourced Spatial Database", The International Arab Journal of Information Technology (IAJIT) ,Volume 17, Number 04, pp. 107 - 115, July 2020, doi: 10.34028/iajit/17/4/12 .
Abstract: Outsourcing spatial database to a third party is becoming a common practice for more and more individuals and
companies to save the cost of managing and maintaining database, where a data owner delegates its spatial data management
tasks to a third party and grants it to provide query services. However, the third party is not full trusted. Thus, authentication
information should be provided to the client for query authentication. In this paper, we introduce an efficient space
authenticated data structure, called Verifiable Similarity Indexing tree (VSS-tree), to support authenticated spatial query. We
build VSS-tree based on SS-tree which employs bounding sphere rather than bounding rectangle for region shape and extend it
with authentication information. Based on VSS-tree, the third party finds query results and builds their corresponding
verification object. The client performs query authentication using the verification object and the public key published. Finally,
we evaluate the performance and validity of our algorithms, the experiment results show that VSS-tree can efficiently support
spatial query and have better performance than Merkle R tree (MR-tree). URL: https://iajit.org/paper/2135
@ARTICLE{2135,
author={Jun Hong1,2, Tao Wen2, and Quan Guo3 1School of Software, North University of China, China 2School of Computer Science and Engineering, Northeastern University, China 3Computer Science and Technology, Dalian Neusoft University of Information, China},
journal={The International Arab Journal of Information Technology (IAJIT)},
title={Query Authentication of Outsourced Spatial Database},
volume={17},
number={04},
pages={107 - 115},
doi={10.34028/iajit/17/4/12 },
year={1970}
,abstract={Outsourcing spatial database to a third party is becoming a common practice for more and more individuals and
companies to save the cost of managing and maintaining database, where a data owner delegates its spatial data management
tasks to a third party and grants it to provide query services. However, the third party is not full trusted. Thus, authentication
information should be provided to the client for query authentication. In this paper, we introduce an efficient space
authenticated data structure, called Verifiable Similarity Indexing tree (VSS-tree), to support authenticated spatial query. We
build VSS-tree based on SS-tree which employs bounding sphere rather than bounding rectangle for region shape and extend it
with authentication information. Based on VSS-tree, the third party finds query results and builds their corresponding
verification object. The client performs query authentication using the verification object and the public key published. Finally,
we evaluate the performance and validity of our algorithms, the experiment results show that VSS-tree can efficiently support
spatial query and have better performance than Merkle R tree (MR-tree).},
keywords={Data Outsourcing, KNN, spatial database, cloud computing, query authentication},
ISSN={2413-9351},
month={Jan}}
TY - JOUR
TI - Query Authentication of Outsourced Spatial Database
T2 -
SP - 107
EP - 115
AU - Jun Hong1
AU - 2
AU - Tao Wen2
AU - and Quan Guo3 1School of Software
AU - North University of China
AU - China 2School of Computer Science and Engineering
AU - Northeastern University
AU - China 3Computer Science and Technology
AU - Dalian Neusoft University of Information
AU - China
DO - 10.34028/iajit/17/4/12
JO - The International Arab Journal of Information Technology (IAJIT)
IS - 9
SN - 2413-9351
VO - 17
VL - 17
JA -
Y1 - Jan 1970
ER -
PY - 1970
AB - Outsourcing spatial database to a third party is becoming a common practice for more and more individuals and
companies to save the cost of managing and maintaining database, where a data owner delegates its spatial data management
tasks to a third party and grants it to provide query services. However, the third party is not full trusted. Thus, authentication
information should be provided to the client for query authentication. In this paper, we introduce an efficient space
authenticated data structure, called Verifiable Similarity Indexing tree (VSS-tree), to support authenticated spatial query. We
build VSS-tree based on SS-tree which employs bounding sphere rather than bounding rectangle for region shape and extend it
with authentication information. Based on VSS-tree, the third party finds query results and builds their corresponding
verification object. The client performs query authentication using the verification object and the public key published. Finally,
we evaluate the performance and validity of our algorithms, the experiment results show that VSS-tree can efficiently support
spatial query and have better performance than Merkle R tree (MR-tree).