Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 108072, 11 pages
http://dx.doi.org/10.1155/2014/108072
Research Article

Protecting Location Privacy for Outsourced Spatial Data in Cloud Storage

1School of Electronics and Information Engineering, Xi’an Jiaotong University, Xi’an 710049, China
2Shaanxi Province Key Laboratory of Computer Network, Xi’an Jiaotong University, Xi’an 710049, China

Received 25 February 2014; Accepted 16 June 2014; Published 6 July 2014

Academic Editor: Chang Wook Ahn

Copyright © 2014 Feng Tian et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. An, X. Gui, W. Zhang, J. Jiang, and J. Yang, “Research on social relations cognitive model of mobile nodes in Internet of Things,” Journal of Network and Computer Applications, vol. 36, no. 2, pp. 799–810, 2013. View at Publisher · View at Google Scholar · View at Scopus
  2. L. Hu, W. Ku, S. Bakiras, and C. Shahabi, “Spatial query integrity with voronoi neighbors,” IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 4, pp. 863–876, 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. W. S. Ku, L. Hu, C. Shahabi, and H. X. Wang, “Query integrity assurance of location-based services accessing outsourced spatial databases,” in Proceedings of the 11th International Symposium on Spatial and Temporal Databases, pp. 80–97, Aalborg, Denmark, 2009.
  4. M. L. Yiu, G. Ghinita, C. S. Jensen, and P. Kalnis, “Enabling search services on outsourced private spatial data,” The VLDB Journal, vol. 19, no. 3, pp. 363–384, 2010. View at Publisher · View at Google Scholar · View at Scopus
  5. R. Huang, X. Gui, S. Yu, and W. Zhuang, “Privacy-preserving computable encryption scheme of Cloud Computing,” Chinese Journal of Computers, vol. 34, no. 12, pp. 2391–2402, 2011. View at Publisher · View at Google Scholar · View at Scopus
  6. P. Indyk and D. Woodruff, “Polylogarithmic private approximations and efficient matching,” in Proceedings of the 3rd Theory of Cryptography Conference, pp. 245–264, New York, NY, USA, 2006.
  7. B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, “Private information retrieval,” Journal of the ACM, vol. 45, no. 6, pp. 965–982, 1998. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  8. W. Ni, J. Zheng, and Z. Chong, “HilAnchor: location privacy protection in the presence of users' preferences,” Journal of Computer Science and Technology, vol. 27, no. 2, pp. 413–427, 2012. View at Publisher · View at Google Scholar · View at Scopus
  9. A. Khoshgozaran, H. Shirani-Mehr, and C. Shahabi, “Blind evaluation of location based queries using space transformation to preserve location privacy,” GeoInformatica, vol. 17, no. 4, pp. 599–634, 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. W. S. Ku, L. Hu, C. Shahabi, and H. X. Wang, “A query integrity assurance scheme for accessing outsourced spatial databases,” Geoinformatica, vol. 17, no. 1, pp. 97–124, 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. B. Moon, H. V. Jagadish, C. Faloutsos, and J. H. Saltz, “Analysis of the clustering properties of the Hilbert space-filling curve,” IEEE Transactions on Knowledge and Data Engineering, vol. 13, no. 1, pp. 124–141, 2001. View at Publisher · View at Google Scholar · View at Scopus
  12. A. Khoshgozaran and C. Shahabi, “Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy,” in Proceedings of the 10th International Symposium on Spatial and Temporal Databases, pp. 239–257, Boston, Mass, USA, 2007.
  13. P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, “Preventing location-based identity inference in anonymous spatial queries,” IEEE Transactions on Knowledge and Data Engineering, vol. 19, no. 12, pp. 1719–1733, 2007. View at Publisher · View at Google Scholar · View at Scopus
  14. L. Sweeney, “k-anonymity: a model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557–570, 2002. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  15. M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” in Proceedings of the 1st International Conference on Mobile Systems, Application, and Services, pp. 31–42, San Francisco, Calif, USA, 2003.
  16. B. Gedik and L. Liu, “Protecting location privacy with personalized k-anonymity: architecture and algorithms,” IEEE Transactions on Mobile Computing, vol. 7, no. 1, pp. 1–18, 2008. View at Publisher · View at Google Scholar · View at Scopus
  17. B. Bamba, L. Liu, P. Pesti, and T. Wang, “Supporting anonymous location queries in mobile environments with privacygrid,” in Proceedings of the 17th International Conference on World Wide Web (WWW '08), pp. 237–246, Beijing, China, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  18. A. Deutsch, R. Hull, A. Vyas, and K. K. Zhao, “Policy-aware sender anonymity in location based services,” in Proceedings of the 26th IEEE International Conference on Data Engineering (ICDE '10), pp. 133–144, Long Beach, Calif, USA, March 2010. View at Publisher · View at Google Scholar · View at Scopus
  19. X. Pan, J. L. Xu, and X. F. Meng, “Protecting location privacy against location-dependent attacks in mobile services,” IEEE Transactions on Knowledge and Data Engineering, vol. 24, no. 8, pp. 1506–1519, 2012. View at Publisher · View at Google Scholar · View at Scopus
  20. A. R. Beresford and F. Stajano, “Location privacy in pervasive computing,” IEEE Pervasive Computing, vol. 2, no. 1, pp. 46–55, 2003. View at Publisher · View at Google Scholar · View at Scopus
  21. B. Palanisamy and L. Liu, “MobiMix: protecting location privacy with mix-zones over road networks,” in Proceedings of the IEEE 27th International Conference on Data Engineering, pp. 494–505, Hannover, Germany, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  22. H. Hacigümüs, B. Iyer, and S. Mehrotra, “Providing database as a service,” in Proceedings of the 18th International Conference on Data Engineering, pp. 29–38, San Jose, Calif, USA, 2002.
  23. H. Hacigümüş, B. Iyer, C. Li, and S. Mehrotra, “Executing SQL over encrypted data in the database-service-provider model,” in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD '02), pp. 216–227, Madison, Wis, USA, June 2002. View at Publisher · View at Google Scholar · View at Scopus
  24. R. Agrawal, J. Kiernan, R. Srikant, and Y. R. Xu, “Order preserving encryption for numeric data,” in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD '04), pp. 563–574, ACM, Paris, France, June 2004. View at Scopus
  25. R. W. Huang, X. L. Gui, S. Yu, and W. Zhuang, “Study of privacy-preserving framework for cloud storage,” Computer Science and Information Systems, vol. 8, no. 3, pp. 801–819, 2011. View at Google Scholar
  26. W. K. Wong, D. W. Cheung, B. Kao, and N. Mamoulis, “Secure kNN computation on encrypted databases,” in Proceedings of the International Conference on Management of Data and 28th Symposium on Principles of Database Systems (SIGMOD-PODS '09), pp. 139–152, Providence, RI, USA, July 2009. View at Publisher · View at Google Scholar · View at Scopus
  27. H. Sagan, Space-Filling Curves, Springer, Berlin, Germany, 1994. View at Publisher · View at Google Scholar · View at MathSciNet
  28. J. A. Orenstein, “Spatial query processing in an object-oriented database system,” in Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 326–336, Washington, DC, USA, 1986.
  29. H. V. Jagadish, “Linear clustering of objects with multiple attributes,” in Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 332–342, Atlantic City, NJ, USA, May 1990. View at Scopus
  30. J. K. Lawder and P. J. H. King, “Querying multi-dimensional data indexed using the Hilbert space-filling curve,” SIGMOD Record, vol. 30, no. 1, pp. 19–24, 2001. View at Google Scholar · View at Scopus
  31. H. Samet, “The quadtree and related hierarchical data structures,” ACM Computing Surveys, vol. 16, no. 2, pp. 187–260, 1984. View at Google Scholar · View at MathSciNet · View at Scopus
  32. “Real Datasets for Spatial Databases: Road Networks and Points of Interest [EB/OL],” http://www.cs.utah.edu/~lifeifei/SpatialDataset.htm.
  33. X. Liu and G. Schrack, “Encoding and decoding the Hilbert order,” Software: Practice and Experience, vol. 26, no. 12, pp. 1335–1346, 1996. View at Google Scholar · View at Scopus
  34. C. Faloutsos and S. Roseman, “Fractals for secondary key retrieval,” in Proceedings of the 8ht ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, pp. 247–252, Philadelphia, Pa, USA, March 1989. View at Scopus