Skip to main navigation Skip to search Skip to main content

A spatial transformation scheme for enhancing privacy and integrity of outsourced databases

  • Hyeong Il Kim
  • , Deul Nyeok Youn
  • , Jae Woo Chang*
  • *Corresponding author for this work

    Research output: Contribution to conferenceConference paperpeer-review

    Abstract

    Outsourcing database is becoming a trend for spatial data owners to reduce the cost of managing and maintaining the database. However, the most important challenge in database outsourcing is how to meet privacy requirements and guarantee the integrity of the query result as well. To carry on both privacy and integrity for outsourced spatial data, we propose a spatial transformation scheme that makes use of shearing transformation with rotation shifting. From the performance evaluation, we show that our scheme has outstanding performance against different kinds of attack models and efficiently handles the query integrity of the query result sets.

    Original languageEnglish
    Title of host publicationFuture Information Technology
    PublisherSpringer Verlag
    Pages203-210
    Number of pages8
    ISBN (Print)9783642550379
    DOIs
    StatePublished - 2014
    Event9th FTRA InternationalConference on Future Information Technology, FutureTech 2014 - Zhangjiajie, China
    Duration: 2014.05.282014.05.31

    Publication series

    NameLecture Notes in Electrical Engineering
    Volume309 LNEE
    ISSN (Print)1876-1100
    ISSN (Electronic)1876-1119

    Conference

    Conference9th FTRA InternationalConference on Future Information Technology, FutureTech 2014
    Country/TerritoryChina
    CityZhangjiajie
    Period14.05.2814.05.31

    Keywords

    • data privacy
    • database transformation
    • proximity attack
    • query integrity
    • shear transformation

    Quacquarelli Symonds(QS) Subject Topics

    • Engineering - Mechanical

    Fingerprint

    Dive into the research topics of 'A spatial transformation scheme for enhancing privacy and integrity of outsourced databases'. Together they form a unique fingerprint.

    Cite this