skip to main content
10.1145/2071880.2071888acmconferencesArticle/Chapter ViewAbstractPublication PagesgisConference Proceedingsconference-collections
research-article

APR-Quad: an update efficient authenticated dictionary for spatial data

Published:01 November 2011Publication History

ABSTRACT

We present an update-efficient authenticated dictionary towards the goal of providing public verification of outsourced dynamic geospatial data consolidated from a dynamic set of contributing sources. We introduce an on-disk authenticated bucket-based PR-quadtree for point and range queries over multiple attributes with minimal tree realignment upon updates. Our design minimizes cryptographic proof overhead using large, block-aligned tree nodes for high fanout and incremental cumulative hashing to consolidate neighboring elements required for verifying completeness. We introduce block-dependent indexing to reduce cryptographic recalculations required upon updates. Collectively, our design decisions result in an authenticated dictionary capable of efficiently incorporating individual updates or entire pre-existing data sets. We validate our approach with simulated data sets derived from experiences managing the Mississippi River floods of May 2011.

References

  1. Bellare, M., et al. A new paradigm for collision-free hashing: Incrementality at reduced cost. In Eurocrypt97 (1997). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Belopotosky, D. Data mining helps uncover fraud in disaster relief. http://www.nationaljournal.com/, June 2006.Google ScholarGoogle Scholar
  3. Boldyreva, A. Efficient threshold signature, multisignature and blind signature schemes based on the gap-diffie-hellman-group signature scheme. In Proceedings of PKC 2003 (2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Chen, S., et al. Fractal prefetching B+-trees: optimizing both cache and disk performance. In SIGMOD International Conference on Management of Data (2002), ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Cheng, W., et al. Authenticating multi-dimensional query results in data publishing. In DBSec (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Devanbu, P. T., et al. Authentic third-party data publication. In Annual Working Conference on Database Security (2001). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Goh, E., et al. Sirius: Securing remote untrusted storage. In Network and Distributed Systems Security Symposium (2003).Google ScholarGoogle Scholar
  8. Goodrich, M. T., et al. Authenticated dictionaries for fresh attribute credentials. In 1st international conference on Trust management (2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Hacigumus, H., et al. Providing database as a service. In 18th International Conference on Data Engineering (2002), ICDE '02. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Hu, L., et al. Verifying spatial queries using voronoi neighbors. In 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Li, F., et al. Dynamic authenticated index structures for outsourced databases. In SIGMOD (2006), SIGMOD. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Li, F., et al. Authenticated index structures for aggregation queries. ACM Trans. Inf. Syst. Secur. 13 (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Lomet, D. The evolution of effective B-tree: Page organization and techniques: A personal account. In ACM SIGMOD Record (Sept. 2001). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Merkle, R. A certified digital signature. Advances in Cryptology 435 (1990). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Mouratidis, K., Sacharidis, D., and Pang, H. Partially materialized digest scheme: an efficient verification method for outsourced databases. The VLDB Journal 18, 1 (2009), 363--381. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Naor, M., and Nissim, K. Certificate revocation and certificate update. Journal on Selected Areas in Communications 18, 4 (Apr. 1999). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Narasimha, M., and Tsudik, G. Authentication of outsourced databases using signature aggregation and chaining. In Database Systems for Advanced Applications (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Nelson, R. C., and Samet, H. A consistent hierarchical representation for vector data. SIGGRAPH Comput. Graph. 20 (August 1986). Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Nuckolls, G., et al. Certifying data from multiple sources {extended abstract}. In ACM Conference on Electronic Commerce (2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Papadopoulos, S., et al. Continuous spatial authentication. In Symposium on Advances in Spatial and Temporal Databases (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Samet, H. Foundations of Multidimensional and Metric Data Structures. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Ware, J. Geospatial data fusion: Training gis for disaster relief operations. In National Geospatial Intelligence School (2009).Google ScholarGoogle Scholar
  23. Yang, Y., et al. Authenticated join processing in outsourced databases. In SIGMOD international conference on Management of data (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Yang, Y., Papadopoulos, S., Papadias, D., and Kollios, G. Spatial outsourcing for location-based services. In ICDE (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Yang, Y., Papadopoulos, S., Papadias, D., and Kollios, G. Authenticated indexing for outsourced spatial databases. The VLDB Journal 18 (June 2009), 631--648. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Yumerefendi, A. R., and Chase, J. S. Strong accountability for network storage. Transactions on Storage (2007). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. APR-Quad: an update efficient authenticated dictionary for spatial data

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              SPRINGL '11: Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
              November 2011
              74 pages
              ISBN:9781450310321
              DOI:10.1145/2071880

              Copyright © 2011 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 November 2011

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
            • Article Metrics

              • Downloads (Last 12 months)2
              • Downloads (Last 6 weeks)1

              Other Metrics

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader