Spatial Data Security Methods
Avinash Kumar Sahu
Under Guidance ofProf. (Mrs.) P. Venkatachalam
Centre of Studies in Resources EngineeringIndian Institute of Technology, Bombay
First Stage Project Presentation18th October 2010
Avinahs Kumar Sahu Spatial Data Security Methods
Avinahs Kumar Sahu Spatial Data Security Methods
Outline
Introduction Problem Statement Related Work Proposed Approach Experiment Summary and Future Work
Avinahs Kumar Sahu Spatial Data Security Methods
Introduction
Introduction Problem Statement Related Work Proposed Approach Experiment Summary and Future Work
Avinahs Kumar Sahu Spatial Data Security Methods
Problem Statement
User
Transformation Parameters Transformed
query
Transformed Data Returned
Original Data
Service Provider
Inverse Transformation
Data Owner
Avinahs Kumar Sahu Spatial Data Security Methods
Related Work
Anonymization, Dummies and Cloaking-Based Approaches
Transformation-Based Approaches Cryptographic-Based Approaches PIR-Based Approaches Authentic publication Approaches Execute SQL over encrypted Data
Avinahs Kumar Sahu Spatial Data Security Methods
Related Work
Anonymization, Dummies and Cloaking-Based Approaches
Avinahs Kumar Sahu Spatial Data Security Methods
Related Work
Transformation-Based Approaches
Avinahs Kumar Sahu Spatial Data Security Methods
Related Work
Cryptographic-Based Approaches
Avinahs Kumar Sahu Spatial Data Security Methods
Related Work
PIR-Based Approaches
Avinahs Kumar Sahu Spatial Data Security Methods
Related Work
Authentic publication Approaches
Query
Query Result and
Verification Object (VO)
Periodic Distribution of digest value
Periodic Data Replication
Data Owner
Client
Data Publisher
Avinahs Kumar Sahu Spatial Data Security Methods
Related Work
Execute SQL over encrypted Data
Avinahs Kumar Sahu Spatial Data Security Methods
Proposed Approach
Introduction Problem Statement Related Work Proposed Approach Experiment Summary and Future Work
Avinahs Kumar Sahu Spatial Data Security Methods
Experiment
Transform Inverse Transform
Avinahs Kumar Sahu Spatial Data Security Methods
Experiment
Transform
Inverse Transform
Avinahs Kumar Sahu Spatial Data Security Methods
Experiment
Transform
Inverse Transform
Avinahs Kumar Sahu Spatial Data Security Methods
Experiment
Transform
Inverse Transform
Avinahs Kumar Sahu Spatial Data Security Methods
Summary and Future Work
Avinahs Kumar Sahu Spatial Data Security Methods
References:Ghinita G., Kalnis P., Kantarcioglu M., Bertino E. A Hybrid Technique for Private Location- Based Queries with Database Protection. Symposium on Spatial and Temporal Databases, pp. 98-116 (2009)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys 2003, San Francisco, CA, pp. 31-42, (2003)
Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: Query processing for location services without compromising privacy: VLDB , pp. 763.774 ,(2006)
Bettini, C., Wang, X.S., Jajodia, S.: Protecting privacy against location-based personal identification. In: Jonker,W., Petkovi´c, M. (eds.) LNCS SDM ,pp- 185-199 ,(2005)
Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy. In:ICDCS 2005, Columbus, OH, pp. 620- 629, (2005)
Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2(1), pp. 46-55, (2003)
Kido H., Yanagisawa Y., Satoh T. Protection of Location Privacy using Dummies for Location-based Services. ICDEW (2005)
Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. Symposium on Spatial and Temporal Databases (SSTD) , pp. 239- 257, (2007)
Avinahs Kumar Sahu Spatial Data Security Methods
References:Yiu, M.L., Jensen, C.S., Huang, X., Lu, H.: Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services: ICDE ,pp 366- 375,(2008)
Lung Y. M., Ghinita G., Jensen C. S., Kalnis P. Outsourcing Search Services on Private Spatial Data. ICDE , pp. 1140-1143, (2009)
Yiu1 M. L., Ghinita G., Jensen C. S., Kalnis P. Enabling search services on outsourced private spatial data. The VLDB Journal , pp. 363-384 (2009).
Zhong, G., Goldberg, I., Hengartner, U.: Louis, lester and pierre: Three protocols for location privacy: Borisov, N., Golle, P. (eds.) ,PET, pp. 62-76, 2007
Zhong, S., Li, L., Liu, Y.G., Yang, Y.R.: Privacy-preserving location-based services for mobile users in wireless networks. Technical report, Yale University,pp 1-13 ,(2004)
Indyk, P., Woodruff, D.P.: Polylogarithmic private approximations and efficient matching. In: Halevi, S., Rabin, T. (eds.) Lecture Notes in Computer Science, Volume 3876/2006, Theory of Cryptography ,pp. 245-264 (2006)
Khoshgozaran A., Shirani-Mehr H., Shahabi C.: SPIRAL, a scalable private information retrieval approach to location privacy: The 2nd International Workshop on Privacy-Aware Location-based Mobile Services (PALMS) in conjunction with MDM 2008, Beijing, China (2008)
Avinahs Kumar Sahu Spatial Data Security Methods
References:S. Mehrotra, C. Li, B. Iyer, Hakan H., Executing SQL over encrypted data in the database-service-provider model,Proceedings of the ACM SIGMOD international conference on Management of data, pp. 59-83, (2002)
Ghinita G., Kalnis P., Khoshgozaran A., Shahabi C., Tan K.L.: Private queries in location based services: anonymizers are not necessary: SIGMOD 2008, pp. 121-132,Vancouver, BC, Canada (2008)
Hengartner, U.: Hiding location information from location-based services: Proceedings of the 2007 International Conference on Mobile Data Management, pp. 245-264, (2007)
Sion, R.: On the computational practicality of private information retrieval: Proceedings of the Network and Distributed Systems Security Symposium. Stony Brook Network Security and Applied Cryptography Lab. Tech. Report ,pp.- 1431-1432 (2007)
Samet H., Sankaranarayanan J., Alborzi H., Scalable network distance browsing in spatial databases, Proceedings of the 2008 ACM SIGMOD international conference on Management of data,pp.43-54, Vancouver, Canada June ( 2008)
M. Gertz, A Kwong, Charles U. Martel, Glen N, Premkumar T. Devanbu, Stuart S. Stubblebine: Databases that tell the Truth: Authentic Data Publication: Bulletin of the Technical Committee on Data Engineering, March (2004)
P.Chandra, P. Bhatt, Issues in Securing GIS Data, S. Bhalla (Ed.): Databases in Networked Information Systems, International Workshop DNIS 2000, Aizu, Japan LNCS 1966, pp. 65–79, December (2000)
Thank You
Avinahs Kumar Sahu Spatial Data Security Methods