Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor | Department of Computing | en_US |
dc.creator | Yung, Ka-Wai | - |
dc.identifier.uri | https://theses.lib.polyu.edu.hk/handle/200/6610 | - |
dc.language | English | en_US |
dc.publisher | Hong Kong Polytechnic University | - |
dc.rights | All rights reserved | en_US |
dc.title | Authenticating moving spatial queries | en_US |
dcterms.abstract | A spatial query is a database query that searches for information from a geometric dataset. k nearest neighbor (kNN) queries and range queries are two types of spatial queries. A k nearest neighbor query searches for the k nearest objects of a query location; a range query searches for objects that are within a specified distance from a query location. A moving spatial query is a continuous submission of a spatial query by a moving client who wants to continuously get the most updated spatial query results. For example, a moving 5NN query can be used to continuously monitor the 5 nearest gas stations of a moving car. As another example, a moving range query can be used to continuously monitor all restaurants that are within 1 kilometer from a walking tourist. A safe region is a technique to optimize mobile query processing. In addition to the query result, a service provider that evaluates moving spatial queries often returns the mobile client a safe region that guarantees that, as long as the mobile client is inside the safe region, the query result is still valid. Hence, the safe region can reduce the communication frequency between the service provider and the mobile clients. However, when a service provider is not trustworthy, it may send inaccurate query results (e.g., sponsored facilities are ranked higher by the service provider) or incorrect safe regions to mobile clients. (e.g., the service provider may return a very large safe region so as to save computational resources). Therefore, it is necessary to devise techniques to authenticate the query results and safe regions in mobile query processing. In this thesis, we present an architecture for carrying out moving spatial query authentication. We develop algorithms to authenticate the results and the safe regions of moving spatial queries. We theoretically prove that our methods can carry out moving query authentication using a minimal amount of communication overhead. Extensive experiments are carried out using both real and synthetic datasets. Experiment results show that our methods can carry out moving spatial query authentication with small communication costs and overheads. | en_US |
dcterms.extent | xvi, 86 p. : ill. ; 30 cm. | en_US |
dcterms.isPartOf | PolyU Electronic Theses | en_US |
dcterms.issued | 2012 | en_US |
dcterms.educationalLevel | All Master | en_US |
dcterms.educationalLevel | M.Phil. | en_US |
dcterms.LCSH | Querying (Computer science) | en_US |
dcterms.LCSH | Geographic information systems. | en_US |
dcterms.LCSH | Mobile communication systems. | en_US |
dcterms.LCSH | Hong Kong Polytechnic University -- Dissertations | en_US |
dcterms.accessRights | open access | en_US |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
b25227208.pdf | For All Users | 1.67 MB | Adobe PDF | View/Open |
Copyright Undertaking
As a bona fide Library user, I declare that:
- I will abide by the rules and legal ordinances governing copyright regarding the use of the Database.
- I will use the Database for the purpose of my research or private study only and not for circulation or further reproduction or any other purpose.
- I agree to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage.
By downloading any item(s) listed above, you acknowledge that you have read and understood the copyright undertaking as stated above, and agree to be bound by all of its terms.
Please use this identifier to cite or link to this item:
https://theses.lib.polyu.edu.hk/handle/200/6610