Abstract:
Mobile devices with geo-positioning capabilities (e.g., GPS) enable users to access information that is relevant to their present location. Users are interested in queryi...Show MoreMetadata
Abstract:
Mobile devices with geo-positioning capabilities (e.g., GPS) enable users to access information that is relevant to their present location. Users are interested in querying about points of interest (POI) in their physical proximity, such as restaurants, cafes, ongoing events, etc. Entities specialized in various areas of interest (e.g., certain niche directions in arts, entertainment, travel) gather large amounts of geo-tagged data that appeal to subscribed users. Such data may be sensitive due to their contents. Furthermore, keeping such information up-to-date and relevant to the users is not an easy task, so the owners of such data sets will make the data accessible only to paying customers. Users send their current location as the query parameter, and wish to receive as result the nearest POIs, i.e., nearest-neighbors (NNs). But typical data owners do not have the technical means to support processing queries on a large scale, so they outsource data storage and querying to a cloud service provider. Many such cloud providers exist who offer powerful storage and computational infrastructures at low cost. However, cloud providers are not fully trusted, and typically behave in an honest-but-curious fashion. Specifically, they follow the protocol to answer queries correctly, but they also collect the locations of the POIs and the subscribers for other purposes. Leakage of POI locations can lead to privacy breaches as well as financial losses to the data owners, for whom the POI data set is an important source of revenue. Disclosure of user locations leads to privacy violations and may deter subscribers from using the service altogether. In this paper, we propose a family of techniques that allow processing of NN queries in an untrusted outsourced environment, while at the same time protecting both the POI and querying users' positions. Our techniques rely on mutable order preserving encoding (mOPE), the only secure order-preserving encryption method known to-date. We ...
Published in: IEEE Transactions on Knowledge and Data Engineering ( Volume: 26, Issue: 11, November 2014)

Department of Computer Science, Purdue University, West Lafayette, IN
Sunoh Choi received the master's and bachelor's degrees in computer science from Korea University. He is currently working toward the PhD degree in the Deparment of Computer Science at Purdue University. His research interests include privacy-preserving query processing and authenticated query processing.
Sunoh Choi received the master's and bachelor's degrees in computer science from Korea University. He is currently working toward the PhD degree in the Deparment of Computer Science at Purdue University. His research interests include privacy-preserving query processing and authenticated query processing.View more

Department of Computer Science, University of Massachusetts Boston, Boston, MA
Gabriel Ghinita is currently an assistant professor in the Department of Computer Science, University of Massachusetts, Boston. His research interests include privacy-preserving transformation of microdata, private queries in location based services and privacy-preserving sharing of sensitive data sets. He serves as reviewer for top journals and conferences such as IEEE Transactions on Parallel and Distributed Systems, IE...Show More
Gabriel Ghinita is currently an assistant professor in the Department of Computer Science, University of Massachusetts, Boston. His research interests include privacy-preserving transformation of microdata, private queries in location based services and privacy-preserving sharing of sensitive data sets. He serves as reviewer for top journals and conferences such as IEEE Transactions on Parallel and Distributed Systems, IE...View more

Department of Computer and Telecommunications Engineering, Yonsei University, Wonju, Korea
Hyo-Sang Lim received the PhD degree from Korea Advanced Institue of Science and Technology. He is currently an assistant professor in the Department of Computer and Telecommunications Engineering, Yonsei University, Wonju, Korea. His research interests include database security and data stream processing technology. He was a research associate at Purdue University.
Hyo-Sang Lim received the PhD degree from Korea Advanced Institue of Science and Technology. He is currently an assistant professor in the Department of Computer and Telecommunications Engineering, Yonsei University, Wonju, Korea. His research interests include database security and data stream processing technology. He was a research associate at Purdue University.View more

Department of Computer Science, Purdue University, West Lafayette, IN
Elisa Bertino is currently a professor of computer science at Purdue University, and serves as the research director of the Center for Education and Research in Information Assurance and Security (CERIAS) and the director of Cyber Center (Discovery Park). Previously, she was a faculty member and the department head in the Department of Computer Science and Communication at the University of Milan. Her main research intere...Show More
Elisa Bertino is currently a professor of computer science at Purdue University, and serves as the research director of the Center for Education and Research in Information Assurance and Security (CERIAS) and the director of Cyber Center (Discovery Park). Previously, she was a faculty member and the department head in the Department of Computer Science and Communication at the University of Milan. Her main research intere...View more

Department of Computer Science, Purdue University, West Lafayette, IN
Sunoh Choi received the master's and bachelor's degrees in computer science from Korea University. He is currently working toward the PhD degree in the Deparment of Computer Science at Purdue University. His research interests include privacy-preserving query processing and authenticated query processing.
Sunoh Choi received the master's and bachelor's degrees in computer science from Korea University. He is currently working toward the PhD degree in the Deparment of Computer Science at Purdue University. His research interests include privacy-preserving query processing and authenticated query processing.View more

Department of Computer Science, University of Massachusetts Boston, Boston, MA
Gabriel Ghinita is currently an assistant professor in the Department of Computer Science, University of Massachusetts, Boston. His research interests include privacy-preserving transformation of microdata, private queries in location based services and privacy-preserving sharing of sensitive data sets. He serves as reviewer for top journals and conferences such as IEEE Transactions on Parallel and Distributed Systems, IEEE Transactions on Knowledge and Data Engineering, IEEE Transactions on Mobile Computing, VLDBJ, VLDB, WWW, ICDE and ACM SIGSPATIAL GIS.
Gabriel Ghinita is currently an assistant professor in the Department of Computer Science, University of Massachusetts, Boston. His research interests include privacy-preserving transformation of microdata, private queries in location based services and privacy-preserving sharing of sensitive data sets. He serves as reviewer for top journals and conferences such as IEEE Transactions on Parallel and Distributed Systems, IEEE Transactions on Knowledge and Data Engineering, IEEE Transactions on Mobile Computing, VLDBJ, VLDB, WWW, ICDE and ACM SIGSPATIAL GIS.View more

Department of Computer and Telecommunications Engineering, Yonsei University, Wonju, Korea
Hyo-Sang Lim received the PhD degree from Korea Advanced Institue of Science and Technology. He is currently an assistant professor in the Department of Computer and Telecommunications Engineering, Yonsei University, Wonju, Korea. His research interests include database security and data stream processing technology. He was a research associate at Purdue University.
Hyo-Sang Lim received the PhD degree from Korea Advanced Institue of Science and Technology. He is currently an assistant professor in the Department of Computer and Telecommunications Engineering, Yonsei University, Wonju, Korea. His research interests include database security and data stream processing technology. He was a research associate at Purdue University.View more

Department of Computer Science, Purdue University, West Lafayette, IN
Elisa Bertino is currently a professor of computer science at Purdue University, and serves as the research director of the Center for Education and Research in Information Assurance and Security (CERIAS) and the director of Cyber Center (Discovery Park). Previously, she was a faculty member and the department head in the Department of Computer Science and Communication at the University of Milan. Her main research interests include security, privacy, digital identity management systems, database systems, distributed systems, and multimedia systems. She served as editor in chief of the VLDB Journal, editorial board member of ACM TISSEC and IEEE Transactions on Dependable and Secure Computing, and is the editor in chief of IEEE Transactions on Dependable and Secure Computing starting since January 2014. She co-authored the book Identity Management—Concepts, Technologies, and Systems. She received the 2002 IEEE Computer Society Technical Achievement Award for outstanding contributions to database systems and database security and advanced data management systems and the 2005 IEEE Computer Society Tsutomu Kanai Award for pioneering and innovative research contributions to secure distributed systems. She is a fellow of the IEEE and ACM.
Elisa Bertino is currently a professor of computer science at Purdue University, and serves as the research director of the Center for Education and Research in Information Assurance and Security (CERIAS) and the director of Cyber Center (Discovery Park). Previously, she was a faculty member and the department head in the Department of Computer Science and Communication at the University of Milan. Her main research interests include security, privacy, digital identity management systems, database systems, distributed systems, and multimedia systems. She served as editor in chief of the VLDB Journal, editorial board member of ACM TISSEC and IEEE Transactions on Dependable and Secure Computing, and is the editor in chief of IEEE Transactions on Dependable and Secure Computing starting since January 2014. She co-authored the book Identity Management—Concepts, Technologies, and Systems. She received the 2002 IEEE Computer Society Technical Achievement Award for outstanding contributions to database systems and database security and advanced data management systems and the 2005 IEEE Computer Society Tsutomu Kanai Award for pioneering and innovative research contributions to secure distributed systems. She is a fellow of the IEEE and ACM.View more