Distributed knn query authentication

C Zhang, C Xu, J Xu, B Choi - 2018 19th IEEE International …, 2018 - ieeexplore.ieee.org
With the prevalence of location-based services and geo-functioned devices, the trend of
spatial data outsourcing is rising. In the data outsourcing scenario, result integrity must be …

Spatial query integrity with voronoi neighbors

L Hu, WS Ku, S Bakiras… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
With the popularity of location-based services and the abundant usage of smart phones and
GPS-enabled devices, the necessity of outsourcing spatial data has grown rapidly over the …

Authentication of Reverse k Nearest Neighbor Query

G Li, C Luo, J Li - Database Systems for Advanced Applications: 20th …, 2015 - Springer
In outsourced spatial databases, the LBS provides query services to the clients on behalf of
the data owner. However, the LBS provider is not always trustworthy and it may send …

Authentication of k nearest neighbor query on road networks

Y Jing, L Hu, WS Ku, C Shahabi - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Outsourcing spatial databases to the cloud provides an economical and flexible way for data
owners to deliver spatial data to users of location-based services. However, in the database …

Verifying spatial queries using voronoi neighbors

L Hu, WS Ku, S Bakiras, C Shahabi - Proceedings of the 18th …, 2010 - dl.acm.org
With the popularity of location-based services and the abundant usage of smart phones and
GPS enabled devices, the necessity of outsourcing spatial data has grown rapidly over the …

SVkNN: Efficient secure and verifiable k-nearest neighbor query on the cloud platform

N Cui, X Yang, B Wang, J Li… - 2020 IEEE 36th …, 2020 - ieeexplore.ieee.org
With the boom in cloud computing, data outsourcing in location-based services is
proliferating and has attracted increasing interest from research communities and …

Authentication of multiple-user spatial keywords queries

IA Obiri, Y Wang, RE Nuhoho… - 2018 IEEE Third …, 2018 - ieeexplore.ieee.org
A top-k Multiple-user Spatial Keywords (MUSK) query takes a location and a set of keywords
as arguments and returns the k best point of interests (POIs) that satisfy multiple-user's …

Authenticating location-based services without compromising location privacy

H Hu, J Xu, Q Chen, Z Yang - Proceedings of the 2012 ACM SIGMOD …, 2012 - dl.acm.org
The popularity of mobile social networking services (mSNSs) is propelling more and more
businesses, especially those in retailing and marketing, into mobile and location-based …

Continuous spatial authentication

S Papadopoulos, Y Yang, S Bakiras… - Advances in Spatial and …, 2009 - Springer
Recent advances in wireless communications and positioning devices have generated a
tremendous amount of interest in the continuous monitoring of spatial queries. However …

Towards Multi-User, Secure, and Verifiable NN Query in Cloud Database

N Cui, K Qian, T Cai, J Li, X Yang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the boom in cloud computing, data outsourcing in location-based services is
proliferating and has attracted increasing interest from research communities and …