Please use this identifier to cite or link to this item:
|Title:||Authenticating moving spatial queries|
|Keywords:||Querying (Computer science)|
Geographic information systems.
Mobile communication systems.
Hong Kong Polytechnic University -- Dissertations
|Publisher:||The Hong Kong Polytechnic University|
|Abstract:||A spatial query is a database query that searches for information from a geometric dataset. k nearest neighbor (kNN) queries and range queries are two types of spatial queries. A k nearest neighbor query searches for the k nearest objects of a query location; a range query searches for objects that are within a specified distance from a query location. A moving spatial query is a continuous submission of a spatial query by a moving client who wants to continuously get the most updated spatial query results. For example, a moving 5NN query can be used to continuously monitor the 5 nearest gas stations of a moving car. As another example, a moving range query can be used to continuously monitor all restaurants that are within 1 kilometer from a walking tourist. A safe region is a technique to optimize mobile query processing. In addition to the query result, a service provider that evaluates moving spatial queries often returns the mobile client a safe region that guarantees that, as long as the mobile client is inside the safe region, the query result is still valid. Hence, the safe region can reduce the communication frequency between the service provider and the mobile clients. However, when a service provider is not trustworthy, it may send inaccurate query results (e.g., sponsored facilities are ranked higher by the service provider) or incorrect safe regions to mobile clients. (e.g., the service provider may return a very large safe region so as to save computational resources). Therefore, it is necessary to devise techniques to authenticate the query results and safe regions in mobile query processing. In this thesis, we present an architecture for carrying out moving spatial query authentication. We develop algorithms to authenticate the results and the safe regions of moving spatial queries. We theoretically prove that our methods can carry out moving query authentication using a minimal amount of communication overhead. Extensive experiments are carried out using both real and synthetic datasets. Experiment results show that our methods can carry out moving spatial query authentication with small communication costs and overheads.|
|Description:||xvi, 86 p. : ill. ; 30 cm.|
PolyU Library Call No.: [THS] LG51 .H577M COMP 2012 Yung
|Rights:||All rights reserved.|
|Appears in Collections:||Thesis|
Show full item record
Files in This Item:
|b25227208_link.htm||For PolyU Users||162 B||HTML||View/Open|
|b25227208_ir.pdf||For All Users (Non-printable)||1.68 MB||Adobe PDF||View/Open|
Checked on Feb 26, 2017
Checked on Feb 26, 2017
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.