1 / 21

Spatial Data Security Methods

Spatial Data Security Methods. Avinash Kumar Sahu Under Guidance of Prof. (Mrs.) P. Venkatachalam Centre of Studies in Resources Engineering Indian Institute of Technology, Bombay First Stage Project Presentation 18 th October 2010. Avinahs Kumar Sahu.

saxon
Download Presentation

Spatial Data Security Methods

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Spatial Data Security Methods Avinash Kumar Sahu Under Guidance of Prof. (Mrs.) P. Venkatachalam Centre of Studies in Resources Engineering Indian Institute of Technology, Bombay First Stage Project Presentation 18th October 2010 Avinahs Kumar Sahu Spatial Data Security Methods

  2. Outline Introduction Problem Statement Related Work Proposed Approach Experiment Summary and Future Work Avinahs Kumar Sahu Spatial Data Security Methods

  3. Introduction Introduction Problem Statement Related Work Proposed Approach Experiment Summary and Future Work Avinahs Kumar Sahu Spatial Data Security Methods

  4. Problem Statement Data Owner Service Provider Transformed Data Returned Transformation Parameters Transformed query User Inverse Transformation Original Data Avinahs Kumar Sahu Spatial Data Security Methods

  5. Related Work • Anonymization, Dummies and Cloaking-Based Approaches • Transformation-Based Approaches • Cryptographic-Based Approaches • PIR-Based Approaches • Authentic publication Approaches • Execute SQL over encrypted Data Avinahs Kumar Sahu Spatial Data Security Methods

  6. Related Work • Anonymization, Dummies and Cloaking-Based Approaches Avinahs Kumar Sahu Spatial Data Security Methods

  7. Related Work • Transformation-Based Approaches Avinahs Kumar Sahu Spatial Data Security Methods

  8. Related Work • Cryptographic-Based Approaches Avinahs Kumar Sahu Spatial Data Security Methods

  9. Related Work • PIR-Based Approaches Avinahs Kumar Sahu Spatial Data Security Methods

  10. Related Work • Authentic publication Approaches Client Periodic Distribution of digest value Data Owner Query Result and Verification Object (VO) Query Data Publisher Periodic Data Replication Avinahs Kumar Sahu Spatial Data Security Methods

  11. Related Work • Execute SQL over encrypted Data Avinahs Kumar Sahu Spatial Data Security Methods

  12. Proposed Approach Introduction Problem Statement Related Work Proposed Approach Experiment Summary and Future Work Avinahs Kumar Sahu Spatial Data Security Methods

  13. Experiment Transform Inverse Transform Avinahs Kumar Sahu Spatial Data Security Methods

  14. Experiment Inverse Transform Transform Avinahs Kumar Sahu Spatial Data Security Methods

  15. Experiment Inverse Transform Transform Avinahs Kumar Sahu Spatial Data Security Methods

  16. Experiment Inverse Transform Transform Avinahs Kumar Sahu Spatial Data Security Methods

  17. Summary and Future Work Avinahs Kumar Sahu Spatial Data Security Methods

  18. References: • Ghinita G., Kalnis P., Kantarcioglu M., Bertino E. A Hybrid Technique for Private Location- Based Queries with Database Protection. Symposium on Spatial and Temporal Databases, pp. 98-116 (2009) • Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys 2003, San Francisco, CA, pp. 31-42, (2003) • Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: Query processing for location services without compromising privacy: VLDB , pp. 763.774 ,(2006) • Bettini, C., Wang, X.S., Jajodia, S.: Protecting privacy against location-based personal identification. In: Jonker,W., Petkovi´c, M. (eds.) LNCS SDM ,pp- 185-199 ,(2005) • Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy. In:ICDCS 2005, Columbus, OH, pp. 620- 629, (2005) • Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2(1), pp. 46-55, (2003) • Kido H., Yanagisawa Y., Satoh T. Protection of Location Privacy using Dummies for Location-based Services. ICDEW (2005) • Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. Symposium on Spatial and Temporal Databases (SSTD) , pp. 239- 257, (2007) Avinahs Kumar Sahu Spatial Data Security Methods

  19. References: • Yiu, M.L., Jensen, C.S., Huang, X., Lu, H.: Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services: ICDE ,pp 366- 375,(2008) • Lung Y. M., Ghinita G., Jensen C. S., Kalnis P. Outsourcing Search Services on Private Spatial Data. ICDE , pp. 1140-1143, (2009) • Yiu1 M. L., Ghinita G., Jensen C. S., Kalnis P. Enabling search services on outsourced private spatial data. The VLDB Journal , pp. 363-384 (2009). • Zhong, G., Goldberg, I., Hengartner, U.: Louis, lester and pierre: Three protocols for location privacy: Borisov, N., Golle, P. (eds.) ,PET, pp. 62-76, 2007 • Zhong, S., Li, L., Liu, Y.G., Yang, Y.R.: Privacy-preserving location-based services for mobile users in wireless networks. Technical report, Yale University,pp 1-13 ,(2004) • Indyk, P., Woodruff, D.P.: Polylogarithmic private approximations and efficient matching. In: Halevi, S., Rabin, T. (eds.) Lecture Notes in Computer Science, Volume 3876/2006, Theory of Cryptography ,pp. 245-264 (2006) • Khoshgozaran A., Shirani-Mehr H., Shahabi C.: SPIRAL, a scalable private information retrieval approach to location privacy: The 2nd International Workshop on Privacy-Aware Location-based Mobile Services (PALMS) in conjunction with MDM 2008, Beijing, China (2008) Avinahs Kumar Sahu Spatial Data Security Methods

  20. References: • S. Mehrotra, C. Li, B. Iyer, Hakan H., Executing SQL over encrypted data in the database-service-provider model,Proceedings of the ACM SIGMOD international conference on Management of data, pp. 59-83, (2002) • Ghinita G., Kalnis P., Khoshgozaran A., Shahabi C., Tan K.L.: Private queries in location based services: anonymizers are not necessary: SIGMOD 2008, pp. 121-132,Vancouver, BC, Canada (2008) • Hengartner, U.: Hiding location information from location-based services:Proceedings of the 2007 International Conference on Mobile Data Management, pp. 245-264, (2007) • Sion, R.: On the computational practicality of private information retrieval: Proceedings of the Network and Distributed Systems Security Symposium. Stony Brook Network Security and Applied Cryptography Lab. Tech. Report ,pp.- 1431-1432 (2007) • Samet H., Sankaranarayanan J., Alborzi H., Scalable network distance browsing in spatial databases, Proceedings of the 2008 ACM SIGMOD international conference on Management of data,pp.43-54, Vancouver, Canada June ( 2008) • M. Gertz, A Kwong, Charles U. Martel, Glen N, Premkumar T. Devanbu, Stuart S. Stubblebine: Databases that tell the Truth: Authentic Data Publication: Bulletin of the Technical Committee on Data Engineering, March (2004) • P.Chandra, P. Bhatt, Issues in Securing GIS Data, S. Bhalla (Ed.): Databases in Networked Information Systems, International Workshop DNIS 2000, Aizu, Japan LNCS 1966, pp. 65–79, December (2000) Avinahs Kumar Sahu Spatial Data Security Methods

  21. Thank You Spatial Data Security Methods Avinahs Kumar Sahu

More Related