Presentation is loading. Please wait.

Presentation is loading. Please wait.

Spatial Data Security Methods Avinash Kumar Sahu Under Guidance of Prof. (Mrs.) P. Venkatachalam Centre of Studies in Resources Engineering Indian Institute.

Similar presentations


Presentation on theme: "Spatial Data Security Methods Avinash Kumar Sahu Under Guidance of Prof. (Mrs.) P. Venkatachalam Centre of Studies in Resources Engineering Indian Institute."— Presentation transcript:

1 Spatial Data Security Methods Avinash Kumar Sahu Under Guidance of Prof. (Mrs.) P. Venkatachalam Centre of Studies in Resources Engineering Indian Institute of Technology, Bombay First Stage Project Presentation 18 th October 2010 Avinahs Kumar Sahu Spatial Data Security Methods

2 Avinahs Kumar Sahu Spatial Data Security Methods Outline Introduction Problem Statement Related Work Proposed Approach Experiment Summary and Future Work

3 Avinahs Kumar Sahu Spatial Data Security Methods Introduction Problem Statement Related Work Proposed Approach Experiment Summary and Future Work

4 Avinahs Kumar Sahu Spatial Data Security Methods Problem Statement User Transformation Parameters Transformed query Transformed Data Returned Original Data Service Provider Inverse Transformation Data Owner

5 Avinahs Kumar Sahu Spatial Data Security Methods Related Work Anonymization, Dummies and Cloaking-Based Approaches Transformation-Based Approaches Cryptographic-Based Approaches PIR-Based Approaches Authentic publication Approaches Execute SQL over encrypted Data

6 Avinahs Kumar Sahu Spatial Data Security Methods Related Work Anonymization, Dummies and Cloaking-Based Approaches

7 Avinahs Kumar Sahu Spatial Data Security Methods Related Work Transformation-Based Approaches

8 Avinahs Kumar Sahu Spatial Data Security Methods Related Work Cryptographic-Based Approaches

9 Avinahs Kumar Sahu Spatial Data Security Methods Related Work PIR-Based Approaches

10 Avinahs Kumar Sahu Spatial Data Security Methods Related Work Authentic publication Approaches Query Query Result and Verification Object (VO) Periodic Distribution of digest value Periodic Data Replication Data Owner Client Data Publisher

11 Avinahs Kumar Sahu Spatial Data Security Methods Related Work Execute SQL over encrypted Data

12 Avinahs Kumar Sahu Spatial Data Security Methods Proposed Approach Introduction Problem Statement Related Work Proposed Approach Experiment Summary and Future Work

13 Avinahs Kumar Sahu Spatial Data Security Methods Experiment TransformInverse Transform

14 Avinahs Kumar Sahu Spatial Data Security Methods Experiment Transform Inverse Transform

15 Avinahs Kumar Sahu Spatial Data Security Methods Experiment Transform Inverse Transform

16 Avinahs Kumar Sahu Spatial Data Security Methods Experiment Transform Inverse Transform

17 Avinahs Kumar Sahu Spatial Data Security Methods Summary and Future Work

18 Avinahs Kumar Sahu Spatial Data Security Methods References: Ghinita G., Kalnis P., Kantarcioglu M., Bertino E. A Hybrid Technique for Private Location- Based Queries with Database Protection. Symposium on Spatial and Temporal Databases, pp. 98-116 (2009) Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys 2003, San Francisco, CA, pp. 31-42, (2003) Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: Query processing for location services without compromising privacy: VLDB, pp. 763.774,(2006) Bettini, C., Wang, X.S., Jajodia, S.: Protecting privacy against location-based personal identification. In: Jonker,W., Petkovi´c, M. (eds.) LNCS SDM,pp- 185-199,(2005) Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy. In:ICDCS 2005, Columbus, OH, pp. 620- 629, (2005) Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2(1), pp. 46-55, (2003) Kido H., Yanagisawa Y., Satoh T. Protection of Location Privacy using Dummies for Location-based Services. ICDEW (2005) Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. Symposium on Spatial and Temporal Databases (SSTD), pp. 239- 257, (2007)

19 Avinahs Kumar Sahu Spatial Data Security Methods References: Yiu, M.L., Jensen, C.S., Huang, X., Lu, H.: Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services: ICDE,pp 366- 375,(2008) Lung Y. M., Ghinita G., Jensen C. S., Kalnis P. Outsourcing Search Services on Private Spatial Data. ICDE, pp. 1140-1143, (2009) Yiu1 M. L., Ghinita G., Jensen C. S., Kalnis P. Enabling search services on outsourced private spatial data. The VLDB Journal, pp. 363-384 (2009). Zhong, G., Goldberg, I., Hengartner, U.: Louis, lester and pierre: Three protocols for location privacy: Borisov, N., Golle, P. (eds.),PET, pp. 62-76, 2007 Zhong, S., Li, L., Liu, Y.G., Yang, Y.R.: Privacy-preserving location-based services for mobile users in wireless networks. Technical report, Yale University,pp 1-13,(2004) Indyk, P., Woodruff, D.P.: Polylogarithmic private approximations and efficient matching. In: Halevi, S., Rabin, T. (eds.) Lecture Notes in Computer Science, Volume 3876/2006, Theory of Cryptography,pp. 245-264 (2006) Khoshgozaran A., Shirani-Mehr H., Shahabi C.: SPIRAL, a scalable private information retrieval approach to location privacy: The 2nd International Workshop on Privacy-Aware Location-based Mobile Services (PALMS) in conjunction with MDM 2008, Beijing, China (2008)

20 Avinahs Kumar Sahu Spatial Data Security Methods References: S. Mehrotra, C. Li, B. Iyer, Hakan H., Executing SQL over encrypted data in the database-service- provider model,Proceedings of the ACM SIGMOD international conference on Management of data, pp. 59-83, (2002) Ghinita G., Kalnis P., Khoshgozaran A., Shahabi C., Tan K.L.: Private queries in location based services: anonymizers are not necessary: SIGMOD 2008, pp. 121-132,Vancouver, BC, Canada (2008) Hengartner, U.: Hiding location information from location-based services: Proceedings of the 2007 International Conference on Mobile Data Management, pp. 245-264, (2007) Sion, R.: On the computational practicality of private information retrieval: Proceedings of the Network and Distributed Systems Security Symposium. Stony Brook Network Security and Applied Cryptography Lab. Tech. Report,pp.- 1431-1432 (2007) Samet H., Sankaranarayanan J., Alborzi H., Scalable network distance browsing in spatial databases, Proceedings of the 2008 ACM SIGMOD international conference on Management of data,pp.43-54, Vancouver, Canada June ( 2008) M. Gertz, A Kwong, Charles U. Martel, Glen N, Premkumar T. Devanbu, Stuart S. Stubblebine: Databases that tell the Truth: Authentic Data Publication: Bulletin of the Technical Committee on Data Engineering, March (2004) P.Chandra, P. Bhatt, Issues in Securing GIS Data, S. Bhalla (Ed.): Databases in Networked Information Systems, International Workshop DNIS 2000, Aizu, Japan LNCS 1966, pp. 65–79, December (2000)

21 Thank You Avinahs Kumar Sahu Spatial Data Security Methods


Download ppt "Spatial Data Security Methods Avinash Kumar Sahu Under Guidance of Prof. (Mrs.) P. Venkatachalam Centre of Studies in Resources Engineering Indian Institute."

Similar presentations


Ads by Google