Continuous Spatial Authentication

10 years 5 months ago
Continuous Spatial Authentication
Recent advances in wireless communications and positioning devices have generated a tremendous amount of interest in the continuous monitoring of spatial queries. However, such applications can incur a heavy burden on the data owner (DO), due to very frequent location updates. Database outsourcing is a viable solution, whereby the DO delegates its database functionality to a service provider (SP) that has the infrastructure and resources to handle the high workload. In this framework, authenticated query processing enables the clients to verify the correctness of the query results that are returned by the SP. In addition to correctness, the dynamic nature of the monitored data requires the provision for temporal completeness, i.e., the clients must be able to verify that there are no missing results in between data updates. This paper constitutes the first work that deals with the authentication of continuous spatial queries, focusing on ranges. We first introduce a baseline solution (...
Stavros Papadopoulos, Yin Yang, Spiridon Bakiras,
Added 27 May 2010
Updated 27 May 2010
Type Conference
Year 2009
Where SSD
Authors Stavros Papadopoulos, Yin Yang, Spiridon Bakiras, Dimitris Papadias
Comments (0)