Spatial Data Security Methods Avinash Kumar Sahu Under Guidance of Prof. (Mrs.) P. Venkatachalam Centre of Studies in Resources Engineering Indian Institute.

Slides:



Advertisements
Similar presentations
Efficient Evaluation of k-Range Nearest Neighbor Queries in Road Networks Jie BaoChi-Yin ChowMohamed F. Mokbel Department of Computer Science and Engineering.
Advertisements

Quality Aware Privacy Protection for Location-based Services Zhen Xiao, Xiaofeng Meng Renmin University of China Jianliang Xu Hong Kong Baptist University.
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
Outsourcing Search Services on Private Spatial Data Man Lung Yiu, Gabriel Ghinita, Christian Jensen, and Panos Kalnis Presenter: Uma Kannan 1.
General Description Coverage-Preserving Routing Protocol for WSNs Distributed, power-balanced multi- hop routing protocol Coverage-preserving based route-
C ANDIDACY E XAM T OPIC : P RIVACY IN L OCATION B ASED S ERVICES Wonsang Song Columbia University.
PRIVACY AND SECURITY ISSUES IN DATA MINING P.h.D. Candidate: Anna Monreale Supervisors Prof. Dino Pedreschi Dott.ssa Fosca Giannotti University of Pisa.
PrivacyGrid Visualization Balaji Palanisamy Saurabh Taneja.
Mohamed F. Mokbel University of Minnesota
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering BigSecret: A Secure Data Management Framework for Key-Value Stores.
Achieving Better Privacy Protection in WSNs Using Trusted Computing Yanjiang YANG, Robert DENG, Jianying ZHOU, Ying QIU.
1 A Distortion-based Metric for Location Privacy Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA - November 9, 2009 Reza Shokri.
Location Privacy in Casper: A Tale of two Systems
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
PRIVÉ : Anonymous Location-Based Queries in Distributed Mobile Systems 1 National University of Singapore 2 University.
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases Brian Thompson 1, Stuart Haber 2, William G. Horne 2, Tomas.
Authentic Publication The TRUTHSAYER Project Chip Martel Premkumar Devanbu Michael Gertz April Kwong Glen Nuckolls Stuart Stubblebine Department of Computer.
Scalable Network Distance Browsing in Spatial Database Samet, H., Sankaranarayanan, J., and Alborzi H. Proceedings of the 2008 ACM SIGMOD international.
CSE 634 Data Mining Techniques Association Rules Hiding (Not Mining) Prateek Duble ( ) Course Instructor: Prof. Anita Wasilewska State University.
MobiHide: A Mobile Peer-to-Peer System for Anonymous Location-Based Queries Gabriel Ghinita, Panos Kalnis, Spiros Skiadopoulos National University of Singapore.
Research interest: Secure database outsourcing Presented by Alla Lanovenko Thesis Adviser: Professor Huiping Guo 599 A 11 December 2006.
A Customizable k-Anonymity Model for Protecting Location Privacy Written by: B. Gedik, L.Liu Presented by: Tal Shoseyov.
PRIVACY CRITERIA. Roadmap Privacy in Data mining Mobile privacy (k-e) – anonymity (c-k) – safety Privacy skyline.
Click to edit Present’s Name Trends in Location-based Services Muhammad Aamir Cheema.
Summary For Chapter 8 Student: Zhibo Wang Professor: Yanqing Zhang.
Privacy and trust in social network
Research Overview Kyriakos Mouratidis Assistant Professor School of Information Systems Singapore Management University
Matching TCP/IP Packet to Detect Stepping-stone Intrusion Jianhua Yang TSYS School of Computer Science Edward Bosworth Center for Information Assurance.
EXTRACT: MINING SOCIAL FEATURES FROM WLAN TRACES: A GENDER-BASED CASE STUDY By Udayan Kumar Ahmed Helmy University of Florida Presented by Ahmed Alghamdi.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Gabriel Ghinita1 Panos Kalnis1 Ali Khoshgozaran2 Cyrus Shahabi2
Privacy Preserving Data Mining on Moving Object Trajectories Győző Gidófalvi Geomatic ApS Center for Geoinformatik Xuegang Harry Huang Torben Bach Pedersen.
Christian S. Jensen joint work with Man Lung Yiu, Hua Lu, Jesper Møller, Gabriel Ghinita, and Panos Kalnis Privacy for Spatial Queries.
Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi Department of Computer Science UC Santa Barbara DBSec 2010.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
ACM HotPlanet 2012 – The 4 th ACM International Workshop on Hot Topics in Planet-Scale Measurement – co-located with ACM MobiSys 25 th June, 2012 Low Wood.
Wireless Sensor Networks In-Network Relational Databases Jocelyn Botello.
Preserving Privacy in Participatory Sensing Systems Authors: Kuan Lun Huang, Salil S. Kanhere (School of CS & Engg., The University of New South Wales,
CSCE 824 Secure and Distributed Database Management Systems FarkasCSCE 8241.
1 SpaceTwist: A Flexible Approach for Hiding Query User Location Speaker: Man Lung Yiu Aalborg University Joint work with Christian S. Jensen, Xuegang.
Related Works LOFConclusion Introduction Contents ICISS
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
Privacy Preserving In LBS
On Non-Cooperative Location Privacy: A Game-theoreticAnalysis
Wei-Shinn Ku Slide 1 Auburn University Computer Science and Software Engineering Query Integrity Assurance of Location-based Services Accessing Outsourced.
A Hybrid Technique for Private Location-Based Queries with Database Protection Gabriel Ghinita 1 Panos Kalnis 2 Murat Kantarcioglu 3 Elisa Bertino 1 1.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Information Technology (Some) Research Trends in Location-based Services Muhammad Aamir Cheema Faculty of Information Technology Monash University, Australia.
EVALUATING LBS PRIVACY IN DYNAMIC CONTEXT 1. Outline 2  Overview Attack Model  Classification Defend Model  Evaluation Module  Conclusion.
CSCE 824 Secure (and Distributed) Database Management Systems FarkasCSCE
Secure Data Outsourcing
Anomaly Detection. Network Intrusion Detection Techniques. Ştefan-Iulian Handra Dept. of Computer Science Polytechnic University of Timișoara June 2010.
Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites Bharath Krishnamachari Gabriel Ghinita Panos Kalnis National University.
2014 Digital Forensics Conference. 2 Conference 3  Post-Proceedings will be published by Springer as an LNCS volume  March 14, 2014 / Aug 24, 2014.
Center for E-Business Technology Seoul National University Seoul, Korea Private Queries in Location Based Services: Anonymizers are not Necessary Gabriel.
 A Two-level Protocol to Answer Private Location-based Queries Roopa Vishwanathan Yan Huang [RoopaVishwanathan, Computer Science and.
Gabriel Ghinita1 Panos Kalnis1 Ali Khoshgozaran2 Cyrus Shahabi2
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
A lightweight authentication scheme based on self-updating strategy for space information network Source: International Journal Of Satellite Communications.
Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data Source : IEEE INFOCOM IEEE International Conference on Computer Communications,
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications, ahead of.
Location Privacy.
مدل داده مناسب براي داده‌هاي عظيم
Telco Big Data (TBD) Example:
Efficient Evaluation of k-NN Queries Using Spatial Mashups
Amar B. Patel , Shushan Zhao
Privacy Protection for E-Health Systems by
Presentation transcript:

Spatial Data Security Methods Avinash Kumar Sahu Under Guidance of Prof. (Mrs.) P. Venkatachalam Centre of Studies in Resources Engineering Indian Institute of Technology, Bombay First Stage Project Presentation 18 th October 2010 Avinahs Kumar Sahu Spatial Data Security Methods

Avinahs Kumar Sahu Spatial Data Security Methods Outline Introduction Problem Statement Related Work Proposed Approach Experiment Summary and Future Work

Avinahs Kumar Sahu Spatial Data Security Methods Introduction Problem Statement Related Work Proposed Approach Experiment Summary and Future Work

Avinahs Kumar Sahu Spatial Data Security Methods Problem Statement User Transformation Parameters Transformed query Transformed Data Returned Original Data Service Provider Inverse Transformation Data Owner

Avinahs Kumar Sahu Spatial Data Security Methods Related Work Anonymization, Dummies and Cloaking-Based Approaches Transformation-Based Approaches Cryptographic-Based Approaches PIR-Based Approaches Authentic publication Approaches Execute SQL over encrypted Data

Avinahs Kumar Sahu Spatial Data Security Methods Related Work Anonymization, Dummies and Cloaking-Based Approaches

Avinahs Kumar Sahu Spatial Data Security Methods Related Work Transformation-Based Approaches

Avinahs Kumar Sahu Spatial Data Security Methods Related Work Cryptographic-Based Approaches

Avinahs Kumar Sahu Spatial Data Security Methods Related Work PIR-Based Approaches

Avinahs Kumar Sahu Spatial Data Security Methods Related Work Authentic publication Approaches Query Query Result and Verification Object (VO) Periodic Distribution of digest value Periodic Data Replication Data Owner Client Data Publisher

Avinahs Kumar Sahu Spatial Data Security Methods Related Work Execute SQL over encrypted Data

Avinahs Kumar Sahu Spatial Data Security Methods Proposed Approach Introduction Problem Statement Related Work Proposed Approach Experiment Summary and Future Work

Avinahs Kumar Sahu Spatial Data Security Methods Experiment TransformInverse Transform

Avinahs Kumar Sahu Spatial Data Security Methods Experiment Transform Inverse Transform

Avinahs Kumar Sahu Spatial Data Security Methods Experiment Transform Inverse Transform

Avinahs Kumar Sahu Spatial Data Security Methods Experiment Transform Inverse Transform

Avinahs Kumar Sahu Spatial Data Security Methods Summary and Future Work

Avinahs Kumar Sahu Spatial Data Security Methods References: Ghinita G., Kalnis P., Kantarcioglu M., Bertino E. A Hybrid Technique for Private Location- Based Queries with Database Protection. Symposium on Spatial and Temporal Databases, pp (2009) Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys 2003, San Francisco, CA, pp , (2003) Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: Query processing for location services without compromising privacy: VLDB, pp ,(2006) Bettini, C., Wang, X.S., Jajodia, S.: Protecting privacy against location-based personal identification. In: Jonker,W., Petkovi´c, M. (eds.) LNCS SDM,pp ,(2005) Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy. In:ICDCS 2005, Columbus, OH, pp , (2005) Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2(1), pp , (2003) Kido H., Yanagisawa Y., Satoh T. Protection of Location Privacy using Dummies for Location-based Services. ICDEW (2005) Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. Symposium on Spatial and Temporal Databases (SSTD), pp , (2007)

Avinahs Kumar Sahu Spatial Data Security Methods References: Yiu, M.L., Jensen, C.S., Huang, X., Lu, H.: Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services: ICDE,pp ,(2008) Lung Y. M., Ghinita G., Jensen C. S., Kalnis P. Outsourcing Search Services on Private Spatial Data. ICDE, pp , (2009) Yiu1 M. L., Ghinita G., Jensen C. S., Kalnis P. Enabling search services on outsourced private spatial data. The VLDB Journal, pp (2009). Zhong, G., Goldberg, I., Hengartner, U.: Louis, lester and pierre: Three protocols for location privacy: Borisov, N., Golle, P. (eds.),PET, pp , 2007 Zhong, S., Li, L., Liu, Y.G., Yang, Y.R.: Privacy-preserving location-based services for mobile users in wireless networks. Technical report, Yale University,pp 1-13,(2004) Indyk, P., Woodruff, D.P.: Polylogarithmic private approximations and efficient matching. In: Halevi, S., Rabin, T. (eds.) Lecture Notes in Computer Science, Volume 3876/2006, Theory of Cryptography,pp (2006) Khoshgozaran A., Shirani-Mehr H., Shahabi C.: SPIRAL, a scalable private information retrieval approach to location privacy: The 2nd International Workshop on Privacy-Aware Location-based Mobile Services (PALMS) in conjunction with MDM 2008, Beijing, China (2008)

Avinahs Kumar Sahu Spatial Data Security Methods References: S. Mehrotra, C. Li, B. Iyer, Hakan H., Executing SQL over encrypted data in the database-service- provider model,Proceedings of the ACM SIGMOD international conference on Management of data, pp , (2002) Ghinita G., Kalnis P., Khoshgozaran A., Shahabi C., Tan K.L.: Private queries in location based services: anonymizers are not necessary: SIGMOD 2008, pp ,Vancouver, BC, Canada (2008) Hengartner, U.: Hiding location information from location-based services: Proceedings of the 2007 International Conference on Mobile Data Management, pp , (2007) Sion, R.: On the computational practicality of private information retrieval: Proceedings of the Network and Distributed Systems Security Symposium. Stony Brook Network Security and Applied Cryptography Lab. Tech. Report,pp (2007) Samet H., Sankaranarayanan J., Alborzi H., Scalable network distance browsing in spatial databases, Proceedings of the 2008 ACM SIGMOD international conference on Management of data,pp.43-54, Vancouver, Canada June ( 2008) M. Gertz, A Kwong, Charles U. Martel, Glen N, Premkumar T. Devanbu, Stuart S. Stubblebine: Databases that tell the Truth: Authentic Data Publication: Bulletin of the Technical Committee on Data Engineering, March (2004) P.Chandra, P. Bhatt, Issues in Securing GIS Data, S. Bhalla (Ed.): Databases in Networked Information Systems, International Workshop DNIS 2000, Aizu, Japan LNCS 1966, pp. 65–79, December (2000)

Thank You Avinahs Kumar Sahu Spatial Data Security Methods