Spatial Data Security Methods

21
Spatial Data Security Methods Avinash Kumar Sahu Under Guidance of Prof. (Mrs.) P. Venkatachalam Centre of Studies in Resources Engineering Indian Institute of Technology, Bombay First Stage Project Presentation 18 th October 2010 Avinahs Kumar Sahu Spatial Data Security Methods

description

Spatial Data Security Methods. Avinash Kumar Sahu Under Guidance of Prof. (Mrs.) P. Venkatachalam Centre of Studies in Resources Engineering Indian Institute of Technology, Bombay First Stage Project Presentation 18 th October 2010. Avinahs Kumar Sahu. - PowerPoint PPT Presentation

Transcript of Spatial Data Security Methods

Page 1: Spatial Data Security Methods

Spatial Data Security Methods

Avinash Kumar Sahu

Under Guidance ofProf. (Mrs.) P. Venkatachalam

Centre of Studies in Resources EngineeringIndian Institute of Technology, Bombay

First Stage Project Presentation18th October 2010

Avinahs Kumar Sahu Spatial Data Security Methods

Page 2: Spatial Data Security Methods

Avinahs Kumar Sahu Spatial Data Security Methods

Outline

Introduction Problem Statement Related Work Proposed Approach Experiment Summary and Future Work

Page 3: Spatial Data Security Methods

Avinahs Kumar Sahu Spatial Data Security Methods

Introduction

Introduction Problem Statement Related Work Proposed Approach Experiment Summary and Future Work

Page 4: Spatial Data Security Methods

Avinahs Kumar Sahu Spatial Data Security Methods

Problem Statement

User

Transformation Parameters Transformed

query

Transformed Data Returned

Original Data

Service Provider

Inverse Transformation

Data Owner

Page 5: Spatial Data Security Methods

Avinahs Kumar Sahu Spatial Data Security Methods

Related Work

Anonymization, Dummies and Cloaking-Based Approaches

Transformation-Based Approaches Cryptographic-Based Approaches PIR-Based Approaches Authentic publication Approaches Execute SQL over encrypted Data

Page 6: Spatial Data Security Methods

Avinahs Kumar Sahu Spatial Data Security Methods

Related Work

Anonymization, Dummies and Cloaking-Based Approaches

Page 7: Spatial Data Security Methods

Avinahs Kumar Sahu Spatial Data Security Methods

Related Work

Transformation-Based Approaches

Page 8: Spatial Data Security Methods

Avinahs Kumar Sahu Spatial Data Security Methods

Related Work

Cryptographic-Based Approaches

Page 9: Spatial Data Security Methods

Avinahs Kumar Sahu Spatial Data Security Methods

Related Work

PIR-Based Approaches

Page 10: Spatial Data Security Methods

Avinahs Kumar Sahu Spatial Data Security Methods

Related Work

Authentic publication Approaches

Query

Query Result and

Verification Object (VO)

Periodic Distribution of digest value

Periodic Data Replication

Data Owner

Client

Data Publisher

HUSSAIN
Page 11: Spatial Data Security Methods

Avinahs Kumar Sahu Spatial Data Security Methods

Related Work

Execute SQL over encrypted Data

Page 12: Spatial Data Security Methods

Avinahs Kumar Sahu Spatial Data Security Methods

Proposed Approach

Introduction Problem Statement Related Work Proposed Approach Experiment Summary and Future Work

Page 13: Spatial Data Security Methods

Avinahs Kumar Sahu Spatial Data Security Methods

Experiment

Transform Inverse Transform

Page 14: Spatial Data Security Methods

Avinahs Kumar Sahu Spatial Data Security Methods

Experiment

Transform

Inverse Transform

Page 15: Spatial Data Security Methods

Avinahs Kumar Sahu Spatial Data Security Methods

Experiment

Transform

Inverse Transform

Page 16: Spatial Data Security Methods

Avinahs Kumar Sahu Spatial Data Security Methods

Experiment

Transform

Inverse Transform

Page 17: Spatial Data Security Methods

Avinahs Kumar Sahu Spatial Data Security Methods

Summary and Future Work

Page 18: Spatial Data Security Methods

Avinahs Kumar Sahu Spatial Data Security Methods

References:Ghinita G., Kalnis P., Kantarcioglu M., Bertino E. A Hybrid Technique for Private Location- Based Queries with Database Protection. Symposium on Spatial and Temporal Databases, pp. 98-116 (2009)

Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys 2003, San Francisco, CA, pp. 31-42, (2003)

Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: Query processing for location services without compromising privacy: VLDB , pp. 763.774 ,(2006)

Bettini, C., Wang, X.S., Jajodia, S.: Protecting privacy against location-based personal identification. In: Jonker,W., Petkovi´c, M. (eds.) LNCS SDM ,pp- 185-199 ,(2005)

Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy. In:ICDCS 2005, Columbus, OH, pp. 620- 629, (2005)

Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2(1), pp. 46-55, (2003)

Kido H., Yanagisawa Y., Satoh T. Protection of Location Privacy using Dummies for Location-based Services. ICDEW (2005)

Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. Symposium on Spatial and Temporal Databases (SSTD) , pp. 239- 257, (2007)

Page 19: Spatial Data Security Methods

Avinahs Kumar Sahu Spatial Data Security Methods

References:Yiu, M.L., Jensen, C.S., Huang, X., Lu, H.: Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services: ICDE ,pp 366- 375,(2008)

Lung Y. M., Ghinita G., Jensen C. S., Kalnis P. Outsourcing Search Services on Private Spatial Data. ICDE , pp. 1140-1143, (2009)

Yiu1 M. L., Ghinita G., Jensen C. S., Kalnis P. Enabling search services on outsourced private spatial data. The VLDB Journal , pp. 363-384 (2009).

Zhong, G., Goldberg, I., Hengartner, U.: Louis, lester and pierre: Three protocols for location privacy: Borisov, N., Golle, P. (eds.) ,PET, pp. 62-76, 2007

Zhong, S., Li, L., Liu, Y.G., Yang, Y.R.: Privacy-preserving location-based services for mobile users in wireless networks. Technical report, Yale University,pp 1-13 ,(2004)

Indyk, P., Woodruff, D.P.: Polylogarithmic private approximations and efficient matching. In: Halevi, S., Rabin, T. (eds.) Lecture Notes in Computer Science, Volume 3876/2006, Theory of Cryptography ,pp. 245-264 (2006)

Khoshgozaran A., Shirani-Mehr H., Shahabi C.: SPIRAL, a scalable private information retrieval approach to location privacy: The 2nd International Workshop on Privacy-Aware Location-based Mobile Services (PALMS) in conjunction with MDM 2008, Beijing, China (2008)

Page 20: Spatial Data Security Methods

Avinahs Kumar Sahu Spatial Data Security Methods

References:S. Mehrotra, C. Li, B. Iyer, Hakan H., Executing SQL over encrypted data in the database-service-provider model,Proceedings of the ACM SIGMOD international conference on Management of data, pp. 59-83, (2002)

Ghinita G., Kalnis P., Khoshgozaran A., Shahabi C., Tan K.L.: Private queries in location based services: anonymizers are not necessary: SIGMOD 2008, pp. 121-132,Vancouver, BC, Canada (2008)

Hengartner, U.: Hiding location information from location-based services: Proceedings of the 2007 International Conference on Mobile Data Management, pp. 245-264, (2007)

Sion, R.: On the computational practicality of private information retrieval: Proceedings of the Network and Distributed Systems Security Symposium. Stony Brook Network Security and Applied Cryptography Lab. Tech. Report ,pp.- 1431-1432 (2007)

Samet H., Sankaranarayanan J., Alborzi H., Scalable network distance browsing in spatial databases, Proceedings of the 2008 ACM SIGMOD international conference on Management of data,pp.43-54, Vancouver, Canada June ( 2008)

M. Gertz, A Kwong, Charles U. Martel, Glen N, Premkumar T. Devanbu, Stuart S. Stubblebine: Databases that tell the Truth: Authentic Data Publication: Bulletin of the Technical Committee on Data Engineering, March (2004)

P.Chandra, P. Bhatt, Issues in Securing GIS Data, S. Bhalla (Ed.): Databases in Networked Information Systems, International Workshop DNIS 2000, Aizu, Japan LNCS 1966, pp. 65–79, December (2000)

Page 21: Spatial Data Security Methods

Thank You

Avinahs Kumar Sahu Spatial Data Security Methods