Font Size: a A A

Authentication Of Range And Moving K Nearest Neighbor Skyline Query For Outsourced Spatial Databases

Posted on:2014-01-30Degree:MasterType:Thesis
Country:ChinaCandidate:Y R HeFull Text:PDF
GTID:2268330422466582Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The outsourced spatial database is a novel database application paradigm. Comparingwith the traditional database, it has better advantages such as management costs anddatabase availability. In outsourced spatial database model, data owners outsource theirdata to server providers, and server providers would be responsible for managing the dataand processing queries. However, as server providers may be untrusted, users may receiveincorrect or incomplete query results. It is necessary that people should take some usefulmethods that can help users to verify the correctness and integrity of query results sendedby server providers. In this paper, the author proposes two kinds of authenticating method,including authentication of range query with location privacy and authentication ofmoving k nearest neighbor skyline query.Firstly, for the problem of authentication of range query with privacy protection, thispaper will build enable signature chain based on Hilbert curves. This paper use Hilbertcurvers to protect the location privacy of data, and create the signature chain according thesequence of Hilbert curvers to ensure the correctness and intergrity of query results. Bythis method, not only server providers can process query in case of not knowing thelocation of query point and data, but also users can verify the query result that receivedfrom server providers.Secondly, for the problem of anthentication of moving k nearest nerghbor skylinequery, this paper will store the data point and its impact region into the MR-tree as a leafnode, and effectively compute verification region with the help of safe region andauxiliary object set. Server providers use verification region to obtain verification objectsby a depth-first traversal of the MR-tree. Users verify the correctness and intergrity ofmoving k nearest nerghbor skyline query results and its safe region by the verificationobjects.Finally, the above mentioned two methods of authentication of query are tested insimulation data set with different parameters, and this paper will give the analysisaccording to the experimental results.
Keywords/Search Tags:Outsourced spatial databases, Authentication of query, privacy protection, Range query, Moving k nearest neighbor Skyline query
PDF Full Text Request
Related items