Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/23172
Title: Efficient Authentication of Continuously Moving kNN Queries
Authors: Yung, D
Li, Y
Lo, E 
Yiu, ML 
Keywords: Query processing
Security
Integrity and protection
Issue Date: 2015
Publisher: Institute of Electrical and Electronics Engineers
Source: IEEE transactions on mobile computing, 2015, v. 14, no. 9, p. 1806-1819 How to cite?
Journal: IEEE transactions on mobile computing 
Abstract: A moving k NN query continuously reports the k results (restaurants) nearest to a moving query point (tourist). In addition to the query results, a service provider often returns to a mobile client a safe region that bounds the validity of query results in order to minimize the communication cost between the service provider and that mobile client. However, when a service provider is not trustworthy, it may send inaccurate query results or incorrect safe regions to mobile clients. In this paper, we present a framework for authenticating both the query results and the safe regions of moving k NN queries. We theoretically proved that our methods for authenticating moving k NN queries minimize the data sent between the service provider and the mobile clients. Extensive experiments are carried out using both real and synthetic data sets and results show that our methods can perform moving k NN query authentication with small communication costs and overhead.
URI: http://hdl.handle.net/10397/23172
ISSN: 1536-1233
EISSN: 1558-0660
DOI: 10.1109/TMC.2014.2365203
Appears in Collections:Journal/Magazine Article

Access
View full-text via PolyU eLinks SFX Query
Show full item record

SCOPUSTM   
Citations

1
Last Week
0
Last month
0
Citations as of Sep 11, 2017

WEB OF SCIENCETM
Citations

1
Last Week
0
Last month
0
Citations as of Sep 15, 2017

Page view(s)

37
Last Week
1
Last month
Checked on Sep 17, 2017

Google ScholarTM

Check

Altmetric



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.