Efficient Authentication of Continuously Moving kNN Queries

Duncan Yung, Yu Li, Eric Lo, Man Lung Yiu

Research output: Journal article publicationJournal articleAcademic researchpeer-review

5 Citations (Scopus)

Abstract

A moving k NN query continuously reports the k results (restaurants) nearest to a moving query point (tourist). In addition to the query results, a service provider often returns to a mobile client a safe region that bounds the validity of query results in order to minimize the communication cost between the service provider and that mobile client. However, when a service provider is not trustworthy, it may send inaccurate query results or incorrect safe regions to mobile clients. In this paper, we present a framework for authenticating both the query results and the safe regions of moving k NN queries. We theoretically proved that our methods for authenticating moving k NN queries minimize the data sent between the service provider and the mobile clients. Extensive experiments are carried out using both real and synthetic data sets and results show that our methods can perform moving k NN query authentication with small communication costs and overhead.
Original languageEnglish
Article number6936886
Pages (from-to)1806-1819
Number of pages14
JournalIEEE Transactions on Mobile Computing
Volume14
Issue number9
DOIs
Publication statusPublished - 1 Sept 2015

Keywords

  • H.2.4.h Query processing
  • H.2.7.d Security
  • integrity and protection

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Efficient Authentication of Continuously Moving kNN Queries'. Together they form a unique fingerprint.

Cite this