Secure top-k query processing via untrusted location-based service providers

Rui Zhang, Yanchao Zhang, Chi Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

25 Citations (Scopus)

Abstract

This paper considers a novel distributed system for collaborative location-based information generation and sharing which become increasingly popular due to the explosive growth of Internet-capable and location-aware mobile devices. The system consists of a data collector, data contributors, location-based service providers (LBSPs), and system users. The data collector gathers reviews about points-of-interest (POIs) from data contributors, while LBSPs purchase POI data sets from the data collector and allow users to perform location-based top-k queries which ask for the POIs in a certain region and with the highest k ratings for an interested POI attribute. In practice, LBSPs are untrusted and may return fake query results for various bad motives, e.g., in favor of POIs willing to pay. This paper presents two novel schemes for users to detect fake top-k query results as an effort to foster the practical deployment and use of the proposed system. The efficacy and efficiency of our schemes are thoroughly analyzed and evaluated.

Original languageEnglish (US)
Title of host publicationProceedings - IEEE INFOCOM
Pages1170-1178
Number of pages9
DOIs
StatePublished - 2012
EventIEEE Conference on Computer Communications, INFOCOM 2012 - Orlando, FL, United States
Duration: Mar 25 2012Mar 30 2012

Other

OtherIEEE Conference on Computer Communications, INFOCOM 2012
CountryUnited States
CityOrlando, FL
Period3/25/123/30/12

Fingerprint

Location based services
Query processing
Mobile devices
Internet

ASJC Scopus subject areas

  • Computer Science(all)
  • Electrical and Electronic Engineering

Cite this

Zhang, R., Zhang, Y., & Zhang, C. (2012). Secure top-k query processing via untrusted location-based service providers. In Proceedings - IEEE INFOCOM (pp. 1170-1178). [6195476] https://doi.org/10.1109/INFCOM.2012.6195476

Secure top-k query processing via untrusted location-based service providers. / Zhang, Rui; Zhang, Yanchao; Zhang, Chi.

Proceedings - IEEE INFOCOM. 2012. p. 1170-1178 6195476.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zhang, R, Zhang, Y & Zhang, C 2012, Secure top-k query processing via untrusted location-based service providers. in Proceedings - IEEE INFOCOM., 6195476, pp. 1170-1178, IEEE Conference on Computer Communications, INFOCOM 2012, Orlando, FL, United States, 3/25/12. https://doi.org/10.1109/INFCOM.2012.6195476
Zhang, Rui ; Zhang, Yanchao ; Zhang, Chi. / Secure top-k query processing via untrusted location-based service providers. Proceedings - IEEE INFOCOM. 2012. pp. 1170-1178
@inproceedings{a7b978a998ff434b8293dc552e6d62ae,
title = "Secure top-k query processing via untrusted location-based service providers",
abstract = "This paper considers a novel distributed system for collaborative location-based information generation and sharing which become increasingly popular due to the explosive growth of Internet-capable and location-aware mobile devices. The system consists of a data collector, data contributors, location-based service providers (LBSPs), and system users. The data collector gathers reviews about points-of-interest (POIs) from data contributors, while LBSPs purchase POI data sets from the data collector and allow users to perform location-based top-k queries which ask for the POIs in a certain region and with the highest k ratings for an interested POI attribute. In practice, LBSPs are untrusted and may return fake query results for various bad motives, e.g., in favor of POIs willing to pay. This paper presents two novel schemes for users to detect fake top-k query results as an effort to foster the practical deployment and use of the proposed system. The efficacy and efficiency of our schemes are thoroughly analyzed and evaluated.",
author = "Rui Zhang and Yanchao Zhang and Chi Zhang",
year = "2012",
doi = "10.1109/INFCOM.2012.6195476",
language = "English (US)",
isbn = "9781467307758",
pages = "1170--1178",
booktitle = "Proceedings - IEEE INFOCOM",

}

TY - GEN

T1 - Secure top-k query processing via untrusted location-based service providers

AU - Zhang, Rui

AU - Zhang, Yanchao

AU - Zhang, Chi

PY - 2012

Y1 - 2012

N2 - This paper considers a novel distributed system for collaborative location-based information generation and sharing which become increasingly popular due to the explosive growth of Internet-capable and location-aware mobile devices. The system consists of a data collector, data contributors, location-based service providers (LBSPs), and system users. The data collector gathers reviews about points-of-interest (POIs) from data contributors, while LBSPs purchase POI data sets from the data collector and allow users to perform location-based top-k queries which ask for the POIs in a certain region and with the highest k ratings for an interested POI attribute. In practice, LBSPs are untrusted and may return fake query results for various bad motives, e.g., in favor of POIs willing to pay. This paper presents two novel schemes for users to detect fake top-k query results as an effort to foster the practical deployment and use of the proposed system. The efficacy and efficiency of our schemes are thoroughly analyzed and evaluated.

AB - This paper considers a novel distributed system for collaborative location-based information generation and sharing which become increasingly popular due to the explosive growth of Internet-capable and location-aware mobile devices. The system consists of a data collector, data contributors, location-based service providers (LBSPs), and system users. The data collector gathers reviews about points-of-interest (POIs) from data contributors, while LBSPs purchase POI data sets from the data collector and allow users to perform location-based top-k queries which ask for the POIs in a certain region and with the highest k ratings for an interested POI attribute. In practice, LBSPs are untrusted and may return fake query results for various bad motives, e.g., in favor of POIs willing to pay. This paper presents two novel schemes for users to detect fake top-k query results as an effort to foster the practical deployment and use of the proposed system. The efficacy and efficiency of our schemes are thoroughly analyzed and evaluated.

UR - http://www.scopus.com/inward/record.url?scp=84861630522&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84861630522&partnerID=8YFLogxK

U2 - 10.1109/INFCOM.2012.6195476

DO - 10.1109/INFCOM.2012.6195476

M3 - Conference contribution

SN - 9781467307758

SP - 1170

EP - 1178

BT - Proceedings - IEEE INFOCOM

ER -