Abstract
A moving range query continuously reports the query result (e.g., restaurants) that are within radius r from a moving query point (e.g., moving tourist). To minimize the communication cost with the mobile clients, a service provider that evaluates moving range queries also returns a safe region that bounds the validity of query results. However, an untrustworthy service provider may report incorrect safe regions to mobile clients. In this paper, we present efficient techniques for authenticating the safe regions of moving range queries. We theoretically proved that our methods for authenticating moving range queries can minimize the data sent between the service provider and the mobile clients. Extensive experiments are carried out using both real and synthetic datasets and results show that our methods incur small communication costs and overhead.
Original language | English |
---|---|
Title of host publication | CIKM 2012 - Proceedings of the 21st ACM International Conference on Information and Knowledge Management |
Pages | 1372-1381 |
Number of pages | 10 |
DOIs | |
Publication status | Published - 19 Dec 2012 |
Event | 21st ACM International Conference on Information and Knowledge Management, CIKM 2012 - Maui, HI, United States Duration: 29 Oct 2012 → 2 Nov 2012 |
Conference
Conference | 21st ACM International Conference on Information and Knowledge Management, CIKM 2012 |
---|---|
Country/Territory | United States |
City | Maui, HI |
Period | 29/10/12 → 2/11/12 |
Keywords
- authentication
- moving queries
ASJC Scopus subject areas
- Software
- Human-Computer Interaction
- Computer Vision and Pattern Recognition
- Computer Networks and Communications