21
Spatial Data Security Methods Avinash Kumar Sahu Under Guidance of Prof. (Mrs.) P. Venkatachalam Centre of Studies in Resources Engineering Indian Institute of Technology, Bombay First Stage Project Presentation 18 th October 2010 Avinahs Kumar Sahu Spatial Data Security Methods

Spatial Data Security Methods Avinash Kumar Sahu Under Guidance of Prof. (Mrs.) P. Venkatachalam Centre of Studies in Resources Engineering Indian Institute

  • View
    214

  • Download
    0

Embed Size (px)

Citation preview

Spatial Data Security Methods

Avinash Kumar Sahu

Under Guidance of

Prof. (Mrs.) P. Venkatachalam

Centre of Studies in Resources EngineeringIndian Institute of Technology, Bombay

First Stage Project Presentation18th October 2010

Avinahs Kumar Sahu Spatial Data Security Methods

Avinahs Kumar Sahu Spatial Data Security Methods

Outline

Introduction

Problem Statement

Related Work

Proposed Approach

Experiment

Summary and Future Work

Avinahs Kumar Sahu Spatial Data Security Methods

Introduction

Introduction

Problem Statement

Related Work

Proposed Approach

Experiment

Summary and Future Work

Avinahs Kumar Sahu Spatial Data Security Methods

Problem Statement

User

Transformation Parameters Transformed

query

Transformed Data Returned

Original Data

Service Provider

Inverse Transformation

Data Owner

Avinahs Kumar Sahu Spatial Data Security Methods

Related Work

Anonymization, Dummies and Cloaking-Based

Approaches

Transformation-Based Approaches

Cryptographic-Based Approaches

PIR-Based Approaches

Authentic publication Approaches

Execute SQL over encrypted Data

Avinahs Kumar Sahu Spatial Data Security Methods

Related Work

Anonymization, Dummies and Cloaking-Based

Approaches

Avinahs Kumar Sahu Spatial Data Security Methods

Related Work

Transformation-Based Approaches

Avinahs Kumar Sahu Spatial Data Security Methods

Related Work

Cryptographic-Based Approaches

Avinahs Kumar Sahu Spatial Data Security Methods

Related Work

PIR-Based Approaches

Avinahs Kumar Sahu Spatial Data Security Methods

Related Work

Authentic publication Approaches

Query

Query Result and

Verification Object (VO)

Periodic Distribution of digest value

Periodic Data Replication

Data Owner

Client

Data Publisher

HUSSAIN

Avinahs Kumar Sahu Spatial Data Security Methods

Related Work

Execute SQL over encrypted Data

Avinahs Kumar Sahu Spatial Data Security Methods

Proposed Approach

Introduction

Problem Statement

Related Work

Proposed Approach

Experiment

Summary and Future Work

Avinahs Kumar Sahu Spatial Data Security Methods

Experiment

Transform Inverse Transform

Avinahs Kumar Sahu Spatial Data Security Methods

Experiment

Transform

Inverse Transform

Avinahs Kumar Sahu Spatial Data Security Methods

Experiment

Transform

Inverse Transform

Avinahs Kumar Sahu Spatial Data Security Methods

Experiment

Transform

Inverse Transform

Avinahs Kumar Sahu Spatial Data Security Methods

Summary and Future Work

Avinahs Kumar Sahu Spatial Data Security Methods

References:Ghinita G., Kalnis P., Kantarcioglu M., Bertino E. A Hybrid Technique for Private Location- Based Queries with Database Protection. Symposium on Spatial and Temporal Databases, pp. 98-116 (2009)

Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys 2003, San Francisco, CA, pp. 31-42, (2003)

Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: Query processing for location services without compromising privacy: VLDB , pp. 763.774 ,(2006)

Bettini, C., Wang, X.S., Jajodia, S.: Protecting privacy against location-based personal identification. In: Jonker,W., Petkovi´c, M. (eds.) LNCS SDM ,pp- 185-199 ,(2005)

Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy. In:ICDCS 2005, Columbus, OH, pp. 620- 629, (2005)

Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2(1), pp. 46-55, (2003)

Kido H., Yanagisawa Y., Satoh T. Protection of Location Privacy using Dummies for Location-based Services. ICDEW (2005)

Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. Symposium on Spatial and Temporal Databases (SSTD) , pp. 239- 257, (2007)

Avinahs Kumar Sahu Spatial Data Security Methods

References:Yiu, M.L., Jensen, C.S., Huang, X., Lu, H.: Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services: ICDE ,pp 366- 375,(2008)

Lung Y. M., Ghinita G., Jensen C. S., Kalnis P. Outsourcing Search Services on Private Spatial Data. ICDE , pp. 1140-1143, (2009)

Yiu1 M. L., Ghinita G., Jensen C. S., Kalnis P. Enabling search services on outsourced private spatial data. The VLDB Journal , pp. 363-384 (2009).

Zhong, G., Goldberg, I., Hengartner, U.: Louis, lester and pierre: Three protocols for location privacy: Borisov, N., Golle, P. (eds.) ,PET, pp. 62-76, 2007

Zhong, S., Li, L., Liu, Y.G., Yang, Y.R.: Privacy-preserving location-based services for mobile users in wireless networks. Technical report, Yale University,pp 1-13 ,(2004)

Indyk, P., Woodruff, D.P.: Polylogarithmic private approximations and efficient matching. In: Halevi, S., Rabin, T. (eds.) Lecture Notes in Computer Science, Volume 3876/2006, Theory of Cryptography ,pp. 245-264 (2006)

Khoshgozaran A., Shirani-Mehr H., Shahabi C.: SPIRAL, a scalable private information retrieval approach to location privacy: The 2nd International Workshop on Privacy-Aware Location-based Mobile Services (PALMS) in conjunction with MDM 2008, Beijing, China (2008)

Avinahs Kumar Sahu Spatial Data Security Methods

References:S. Mehrotra, C. Li, B. Iyer, Hakan H., Executing SQL over encrypted data in the database-service-provider model,Proceedings of the ACM SIGMOD international conference on Management of data, pp. 59-83, (2002)

Ghinita G., Kalnis P., Khoshgozaran A., Shahabi C., Tan K.L.: Private queries in location based services: anonymizers are not necessary: SIGMOD 2008, pp. 121-132,Vancouver, BC, Canada (2008)

Hengartner, U.: Hiding location information from location-based services: Proceedings of the 2007 International Conference on Mobile Data Management, pp. 245-264, (2007)

Sion, R.: On the computational practicality of private information retrieval: Proceedings of the Network and Distributed Systems Security Symposium. Stony Brook Network Security and Applied Cryptography Lab. Tech. Report ,pp.- 1431-1432 (2007)

Samet H., Sankaranarayanan J., Alborzi H., Scalable network distance browsing in spatial databases, Proceedings of the 2008 ACM SIGMOD international conference on Management of data,pp.43-54, Vancouver, Canada June ( 2008)

M. Gertz, A Kwong, Charles U. Martel, Glen N, Premkumar T. Devanbu, Stuart S. Stubblebine: Databases that tell the Truth: Authentic Data Publication: Bulletin of the Technical Committee on Data Engineering, March (2004)

P.Chandra, P. Bhatt, Issues in Securing GIS Data, S. Bhalla (Ed.): Databases in Networked Information Systems, International Workshop DNIS 2000, Aizu, Japan LNCS 1966, pp. 65–79, December (2000)

Thank You

Avinahs Kumar Sahu Spatial Data Security Methods