Filters








1,366 Hits in 4.5 sec

Distributed kNN Query Authentication

Ce Zhang, Cheng Xu, Jianliang Xu, Byron Choi
2018 2018 19th IEEE International Conference on Mobile Data Management (MDM)  
In this paper, we investigate the query authentication problem in distributed environments and focus on the k nearest neighbor (kNN) query, which is widely used in spatial data analytics.  ...  We design a new distributed spatial authenticated data structure (ADS), distributed MR-tree, to facilitate efficient kNN processing.  ...  Distributed Authenticated kNN Query Cost In this section, we evaluate the query cost of distributed authenticated kNN queries.  ... 
doi:10.1109/mdm.2018.00034 dblp:conf/mdm/0004XC18 fatcat:nj3hnvmc45a33mqeh7mb6kdxde

Authentication of moving kNN queries

Man Lung Yiu, Eric Lo, Duncan Yung
2011 2011 IEEE 27th International Conference on Data Engineering  
In this paper, we present a framework and algorithms to authenticate results and safe regions of moving kNN queries.  ...  A moving kNN query continuously reports the k nearest neighbors of a moving query point.  ...  Our future work is to study the authentication of other moving queries such as moving range queries. Fig. 2 . 2 Moving kNN authentication IV.  ... 
doi:10.1109/icde.2011.5767829 dblp:conf/icde/YiuLY11 fatcat:d6nmfu2ynzh6xjmjgqb5fp525e

Query Authentication of Outsourced Spatial Database

Jun Hong, Tao Wen, Quan Guo
2020 ˜The œinternational Arab journal of information technology  
Thus, authentication information should be provided to the client for query authentication.  ...  The client performs query authentication using the verification object and the public key published.  ...  [4] proposed a novel distributed spatial authentication data structure, called distributed MR-tree, to for query verification of k-Nearest Neighbour (kNN) queries. Papadopoulos et al.  ... 
doi:10.34028/iajit/17/4/12 fatcat:kpx6m6aiurcnxjs2yeozx3ehbu

Editorial for special issue on "security and privacy protection in the era of IoT devices"

Weizhi Meng, Daniel Xiapu Luo, Chunhua Su, Debiao He, Marios Anagnostopoulos, Qian Chen
2021 Digital Communications and Networks  
.  You may not further distribute the material or use it for any profit-making activity or commercial gain  You may freely distribute the URL identifying the publication in the public portal If you believe  ...  query algorithms in TMWSNs named BAFSKQ (the basic algorithm of KNN query) and SEKQAM (the KNN query algorithm based on MR-Tree), respectively.  ...  In the first paper entitled "Secure K-Nearest Neighbor Queries in Twotiered Mobile Wireless Sensor Networks", Fan et al. focused on the secure KNN query technology in TMWSNs and proposed two secure KNN  ... 
doi:10.1016/j.dcan.2021.04.003 fatcat:rmsjl32usbgfniqgechem3zmma

Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud

Jun Hong, Tao Wen, Quan Guo, Zhengwang Ye
2017 Mathematical Problems in Engineering  
A novel scheme is proposed in this paper to effectuate k-nearest neighbors (kNN) query and kNN query authentication on an encrypted outsourced spatial database.  ...  Furthermore, the similarity search tree is extended to build a novel verifiable SS-tree that supports efficient kNN query and kNN query verification.  ...  [15] presented a framework for authenticating moving kNN queries using the safe region approach. In other query authentication approaches, Xie et al.  ... 
doi:10.1155/2017/8109730 fatcat:jg24dtvfnjcjdltxw7momuxh3m

To Secure Query Services in the Cloud with RASP Data Perturbation

2015 International Journal of Science and Research (IJSR)  
In RASP encryption data confidentiality and query privacy are guaranteed when appealing it for range query and kNN. In order to process the range query to kNN query here we used kNN-R algorithm.  ...  RASP used to provide security to the setting of cloud based computing while enabling much faster query processing compared to the encryption based approach.  ...  To find the nearest neighbor the RASP kNN query service (kNN-R) uses to process kNN queries. Conclusion & Future Scope RASP method with range query and kNN query.  ... 
doi:10.21275/v4i12.nov152298 fatcat:bfdxqd4rwvffnlp5aqw3vkfx24

Building an Authentication and Quality of Query Services in the Cloud

J. Sunitha, Mrs. A.M. Sermakani
2015 Procedia Computer Science  
K-nearestneighbor query is to find the nearest record to the query point. kNN-R algorithm kNN is the k-nearest neighbor algorithm.  ...  Query authentication In Server Section authorized clients are added with respective MAC & IP address. In this section server maintains the log of all query processed.  ... 
doi:10.1016/j.procs.2015.04.073 fatcat:4kduznav5zbabaw5jpfw7cjv5m

Spatial Query Integrity with Voronoi Neighbors

Ling Hu, Wei-Shinn Ku, Spiridon Bakiras, Cyrus Shahabi
2013 IEEE Transactions on Knowledge and Data Engineering  
Nevertheless, in this database outsourcing paradigm, the authentication of the query results at the client remains a challenging problem.  ...  queries, as well as more advanced query types like reverse k nearest neighbor, aggregate nearest neighbor, and spatial skyline.  ...  In addition to static queries, in [36] the MR-tree is utilized for authenticating moving kNN queries.  ... 
doi:10.1109/tkde.2011.267 fatcat:okz72lpdlbaw3limxa46tgstwi

Verifying spatial queries using Voronoi neighbors

Ling Hu, Wei-Shinn Ku, Spiridon Bakiras, Cyrus Shahabi
2010 Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems - GIS '10  
Nevertheless, in the database outsourcing paradigm, the authentication of the query results at the client remains a challenging problem.  ...  Our approach can handle both k nearest neighbor (kNN) and range queries, and is based on neighborhood information derived by the Voronoi diagram of the underlying spatial dataset.  ...  Based on [2] , Cheng and Tan designed a mechanism for authenticating k nearest neighbor (kNN) queries on multi-dimensional databases, ensuring that the result set is complete, authentic, and minimal  ... 
doi:10.1145/1869790.1869839 dblp:conf/gis/HuKBS10 fatcat:6zyxejzh3jdj3dwkwakw7pzvhm

Predictive spatio-temporal queries

Abdeltawab M. Hendawi, Mohamed F. Mokbel
2012 Proceedings of the First ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems - MobiGIS '12  
In the last few years, one of the most exciting work on spatio-temporal data management is about predictive queries.  ...  The goal of this paper is to catch the interesting areas and future work under the umbrella of predictive queries over spatio-temporal data.  ...  KNN queries, respectively.  ... 
doi:10.1145/2442810.2442828 dblp:conf/gis/HendawiM12a fatcat:jstmvcb44fhgtmkqawmdwq4jfu

Biometric Authentication- Person Identification using Iris Recognition

Ankur Jyoti Sarmah, Gaurab Narayan Dutta, Dakshee Lahkar, Bimrisha Lahkar, Neelotpal Talukdar
2022 Zenodo  
authenticate the query image.  ...  As a reliable biometric authentication method, it is considered as the most explicit.  ...  Further the query image is checked for authentication. IV.  ... 
doi:10.5281/zenodo.6658784 fatcat:aejm4u2w4neefnr4odfrfsa3am

Extensible Location Dependent Spatial Object Search on Road Networks
English

P Karthigeyan, M Senthil Raja, B Prabhu, R Gnanaselvam
2014 International Journal of Engineering Trends and Technoloy  
It is very efficient and flexible for various types of queries, namely, range search and nearest neighbor search, on objects over large-scale networks.  ...  Index Size Fig 4. 2 : 2 Source KNN Query Performance (a). Networks (b). Fig 4.3: Multisource kNN query performance. (a) Networks. (b) No. of objects (NA). (c) Distributions (NA).  ...  In the experiments, we generate 100 random queries and report the average query processing time. Experiments on Single-Source kNN Query First, we conduct evaluations for single-source kNN queries.  ... 
doi:10.14445/22315381/ijett-v18p204 fatcat:7cvu4sv7svfinhgxktivijvhre

Knn Search with Location and Query Solitude Using Bit Exchanging Method

K Suja, Dr A. Rengarajan
2018 International Journal of Engineering & Technology  
Examinations have demonstrated that our answer is proper for KNN inquiries.  ...  Proposed System This project is devoted to tending to this testing issue of confirming moving kNN questions.  ...  It demonstrates expanding significance as distributed computing drives more organizations to outsource their information and questioning administrations.  ... 
doi:10.14419/ijet.v7i3.34.18967 fatcat:kplw3gwgbbfndjiupn6ilmzzni

Authenticated Multistep Nearest Neighbor Search

Stavros Papadopoulos, Lixing Wang, Yin Yang, Dimitris Papadias, Panagiotis Karras
2011 IEEE Transactions on Knowledge and Data Engineering  
In this setting, clients issue NN queries to a server that maintains a database signed by a trusted authority.  ...  Moreover, we generalize our solution for a distributed setting, where the database is horizontally partitioned over several servers.  ...  SIMPLE DISTRIBUTED AMN In SD-AMN, a client sends its kNN query Q to all servers.  ... 
doi:10.1109/tkde.2010.157 fatcat:uvphsjy4n5fubh4wek6uylqkky

Authenticated Multi-Step Nearest Neighbor Search

Stavros Papadopoulos, Lixing Wang, Yin Yang, Dimitris Papadias, Panagiotis Karras
2010 IEEE Transactions on Knowledge and Data Engineering  
In this setting, clients issue NN queries to a server that maintains a database signed by a trusted authority.  ...  Moreover, we generalize our solution for a distributed setting, where the database is horizontally partitioned over several servers.  ...  SIMPLE DISTRIBUTED AMN In SD-AMN, a client sends its kNN query Q to all servers.  ... 
doi:10.1109/tkde.2010.58 fatcat:24th25vetrc4jowq3tll7lsuvu
« Previous Showing results 1 — 15 out of 1,366 results