TY - JOUR
T1 - Enabling search services on outsourced private spatial data
AU - Yiu, Man Lung
AU - Ghinita, Gabriel
AU - Jensen, Christian Søndergaard
AU - Kalnis, Panos
N1 - KAUST Repository Item: Exported on 2020-10-01
PY - 2009/10/30
Y1 - 2009/10/30
N2 - Cloud computing services enable organizations and individuals to outsource the management of their data to a service provider in order to save on hardware investments and reduce maintenance costs. Only authorized users are allowed to access the data. Nobody else, including the service provider, should be able to view the data. For instance, a real-estate company that owns a large database of properties wants to allow its paying customers to query for houses according to location. On the other hand, the untrusted service provider should not be able to learn the property locations and, e. g., selling the information to a competitor. To tackle the problem, we propose to transform the location datasets before uploading them to the service provider. The paper develops a spatial transformation that re-distributes the locations in space, and it also proposes a cryptographic-based transformation. The data owner selects the transformation key and shares it with authorized users. Without the key, it is infeasible to reconstruct the original data points from the transformed points. The proposed transformations present distinct trade-offs between query efficiency and data confidentiality. In addition, we describe attack models for studying the security properties of the transformations. Empirical studies demonstrate that the proposed methods are efficient and applicable in practice. © 2009 Springer-Verlag.
AB - Cloud computing services enable organizations and individuals to outsource the management of their data to a service provider in order to save on hardware investments and reduce maintenance costs. Only authorized users are allowed to access the data. Nobody else, including the service provider, should be able to view the data. For instance, a real-estate company that owns a large database of properties wants to allow its paying customers to query for houses according to location. On the other hand, the untrusted service provider should not be able to learn the property locations and, e. g., selling the information to a competitor. To tackle the problem, we propose to transform the location datasets before uploading them to the service provider. The paper develops a spatial transformation that re-distributes the locations in space, and it also proposes a cryptographic-based transformation. The data owner selects the transformation key and shares it with authorized users. Without the key, it is infeasible to reconstruct the original data points from the transformed points. The proposed transformations present distinct trade-offs between query efficiency and data confidentiality. In addition, we describe attack models for studying the security properties of the transformations. Empirical studies demonstrate that the proposed methods are efficient and applicable in practice. © 2009 Springer-Verlag.
UR - http://hdl.handle.net/10754/561477
UR - http://link.springer.com/10.1007/s00778-009-0169-7
UR - http://www.scopus.com/inward/record.url?scp=77953139328&partnerID=8YFLogxK
U2 - 10.1007/s00778-009-0169-7
DO - 10.1007/s00778-009-0169-7
M3 - Article
SN - 1066-8888
VL - 19
SP - 363
EP - 384
JO - The VLDB Journal
JF - The VLDB Journal
IS - 3
ER -