Bob-Tree: An Efficient B + -Tree Based Index Structure for Geographic-Aware Obfuscation
نویسندگان
چکیده
The privacy protection of personal location information increasingly gains special attention in the field of location-based services, and obfuscation is the most popular technique aiming at protecting this sensitive information. However, all of the conventional obfuscation techniques are geometry-based and separated from the database level. Thus, the query processing has two timeconsuming phases due to the number of disk accesses required to retrieve the user’s exact location, and the location obfuscation. Also, since these techniques are geometry-based, they cannot assure location privacy when the adversary has knowledge about the geography of the obfuscated region. We address these problems by proposing B-tree, an index structure that is based on B-tree and contains geographic-aware information on its nodes. Experiments show that B-tree provides a significant improvement over the algorithm separated from the database level for query processing time and location privacy protection.
منابع مشابه
A Database-centric Approach to Privacy Protection in Location-based Applications
Privacy preserving in location based services (LBS) has been emerging as a measure for the quality of both LBS providers’ services and mobile users’ need. A lot of research already done on it can be used to assure user privacy while the quality of services (QoS) must be kept up. However, all of the conventional obfuscation techniques are geometry-based and separated from the database level. Unl...
متن کاملSemantic-Aware Obfuscation for Location Privacy at Database Level
Although many techniques have been proposed to deal with location privacy problem, which is one of popular research issues in location based services, some limitations still remain and hence they cannot be applied to the real world. One of the most typical proposed techniques is obfuscation that preserves location privacy by degrading the quality of user’s location information. But the less exa...
متن کاملAutomatic QoS-aware Web Services Composition based on Set-Cover Problem
By definition, web-services composition works on developing merely optimum coordination among a number of available web-services to provide a new composed web-service intended to satisfy some users requirements for which a single web service is not (good) enough. In this article, the formulation of the automatic web-services composition is proposed as several set-cover problems and an approxima...
متن کاملParallel Join Algorithms based on Parallel B+-trees
Within the last several years, a number of parallel algorithms for the join operation have been proposed. However, almost all of the algorithms did not take advantages of the underlying parallel storage structures or data declustering methods of the operand relations. This paper introduces the concept of parallel storage structure or declustering aware parallel join algorithm. A parallel B+-tre...
متن کاملA Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing
Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios. Probabilistic approaches are proposed in order to reduce the computation overhead pertaining to the verification process. In this paper, we use the notion of trust as the basis of our probabilistic app...
متن کامل