Limits...
Protecting location privacy for outsourced spatial data in cloud storage.

Tian F, Gui X, An J, Yang P, Zhao J, Zhang X - ScientificWorldJournal (2014)

Bottom Line: As cloud computing services and location-aware devices are fully developed, a large amount of spatial data needs to be outsourced to the cloud storage provider, so the research on privacy protection for outsourced spatial data gets increasing attention from academia and industry.But sufficient security analysis for standard Hilbert curve (SHC) is seldom proceeded.The evaluation results indicate that SHC(∗) and DSC are more secure than SHC, and DSC achieves the best index generation performance.

View Article: PubMed Central - PubMed

Affiliation: School of Electronics and Information Engineering, Xi'an Jiaotong University, Xi'an 710049, China ; Shaanxi Province Key Laboratory of Computer Network, Xi'an Jiaotong University, Xi'an 710049, China.

ABSTRACT
As cloud computing services and location-aware devices are fully developed, a large amount of spatial data needs to be outsourced to the cloud storage provider, so the research on privacy protection for outsourced spatial data gets increasing attention from academia and industry. As a kind of spatial transformation method, Hilbert curve is widely used to protect the location privacy for spatial data. But sufficient security analysis for standard Hilbert curve (SHC) is seldom proceeded. In this paper, we propose an index modification method for SHC (SHC(∗)) and a density-based space filling curve (DSC) to improve the security of SHC; they can partially violate the distance-preserving property of SHC, so as to achieve better security. We formally define the indistinguishability and attack model for measuring the privacy disclosure risk of spatial transformation methods. The evaluation results indicate that SHC(∗) and DSC are more secure than SHC, and DSC achieves the best index generation performance.

Show MeSH

Related in: MedlinePlus

The quad tree partition: (a) C = 3, (b) C = 2, and (c) C = 1.
© Copyright Policy - open-access
Related In: Results  -  Collection


getmorefigures.php?uid=PMC4109601&req=5

fig3: The quad tree partition: (a) C = 3, (b) C = 2, and (c) C = 1.

Mentions: Quad Tree-Based Space Partition. In DSC, the spatial domain is partitioned by quad tree structure. The granularity is decided by capacity C, which means that, under current partition, if the number of POIs in region R exceeds C, we should continue to partition R, until the number of POIs in each partitioned region does not exceed C. Figure 3 shows the different partitions using various C. From Figure 3 we can see that the smaller the C is, the more fine-grained the partition is.


Protecting location privacy for outsourced spatial data in cloud storage.

Tian F, Gui X, An J, Yang P, Zhao J, Zhang X - ScientificWorldJournal (2014)

The quad tree partition: (a) C = 3, (b) C = 2, and (c) C = 1.
© Copyright Policy - open-access
Related In: Results  -  Collection

Show All Figures
getmorefigures.php?uid=PMC4109601&req=5

fig3: The quad tree partition: (a) C = 3, (b) C = 2, and (c) C = 1.
Mentions: Quad Tree-Based Space Partition. In DSC, the spatial domain is partitioned by quad tree structure. The granularity is decided by capacity C, which means that, under current partition, if the number of POIs in region R exceeds C, we should continue to partition R, until the number of POIs in each partitioned region does not exceed C. Figure 3 shows the different partitions using various C. From Figure 3 we can see that the smaller the C is, the more fine-grained the partition is.

Bottom Line: As cloud computing services and location-aware devices are fully developed, a large amount of spatial data needs to be outsourced to the cloud storage provider, so the research on privacy protection for outsourced spatial data gets increasing attention from academia and industry.But sufficient security analysis for standard Hilbert curve (SHC) is seldom proceeded.The evaluation results indicate that SHC(∗) and DSC are more secure than SHC, and DSC achieves the best index generation performance.

View Article: PubMed Central - PubMed

Affiliation: School of Electronics and Information Engineering, Xi'an Jiaotong University, Xi'an 710049, China ; Shaanxi Province Key Laboratory of Computer Network, Xi'an Jiaotong University, Xi'an 710049, China.

ABSTRACT
As cloud computing services and location-aware devices are fully developed, a large amount of spatial data needs to be outsourced to the cloud storage provider, so the research on privacy protection for outsourced spatial data gets increasing attention from academia and industry. As a kind of spatial transformation method, Hilbert curve is widely used to protect the location privacy for spatial data. But sufficient security analysis for standard Hilbert curve (SHC) is seldom proceeded. In this paper, we propose an index modification method for SHC (SHC(∗)) and a density-based space filling curve (DSC) to improve the security of SHC; they can partially violate the distance-preserving property of SHC, so as to achieve better security. We formally define the indistinguishability and attack model for measuring the privacy disclosure risk of spatial transformation methods. The evaluation results indicate that SHC(∗) and DSC are more secure than SHC, and DSC achieves the best index generation performance.

Show MeSH
Related in: MedlinePlus