Abstract | ||
---|---|---|
A moving kNN query continuously reports the k results (restaurants) nearest to a moving query point (tourist). In addition to the query results, a service provider often returns to a mobile client a safe region that bounds the validity of query results in order to minimize the communication cost between the service provider and that mobile client. However, when a service provider is not trustworthy, it may send inaccurate query results or incorrect safe regions to mobile clients. In this paper, we present a framework for authenticating both the query results and the safe regions of moving kNN queries. We theoretically proved that our methods for authenticating moving kNN queries minimize the data sent between the service provider and the mobile clients. Extensive experiments are carried out using both real and synthetic data sets and results show that our methods can perform moving kNN query authentication with small communication costs and overhead. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1109/TMC.2014.2365203 | IEEE Transactions on Mobile Computing |
Keywords | Field | DocType |
Authentication,Mobile computing,Servers,Mobile communication,Generators,Query processing,Spatial databases | Mobile computing,Query optimization,Web search query,Mobile client,Authentication,Computer science,Server,Computer network,Service provider,Mobile telephony | Journal |
Volume | Issue | ISSN |
14 | 9 | 1536-1233 |
Citations | PageRank | References |
0 | 0.34 | 26 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Duncan Yung | 1 | 57 | 5.30 |
Yu Li | 2 | 25 | 4.17 |
Eric Lo | 3 | 813 | 51.50 |
man lung yiu | 4 | 2436 | 109.78 |