SlideShare a Scribd company logo
1 of 30
AUTHENTICATING MULTIPLE USER-DEFINED
SPATIAL QUERIES
(AMUDSG)
A PRESENTATION BY:
KUUPOLE ERU-BAAR EWALD – 201824010002
&
BONSU ADJEI-ARTHUR- 201824080009
CONTENTS
 KEY WORDS.
 WHAT IS IT?.
 ADVANTAGES OF PROPOSED
AMUSQ.
 HOW IT WORKS.
 THE PROBLEM WITH EXISTING
QUERIES.
 ALREADY EXISTING QUERIES.
 OTHER AUTHENTICATED
QUERY PROCESSING.
 AUTHENTICATION OF SPECIAL
CASES.
 NOTATIONS.
 CRITERIA FOR DORMINACE.
 SIGNING.
 MR TREE.
 CONDITIONING.
 QUEUING.
 OVERVIEW OF TRANSVERSAL.
 CONDITIONS FOR ACCEPTING RESULT.
 THE CONTAINED ITEMS FOR EVERY (VO).
 ALGORITHM 1(QUERY PROCESSING).
 ALGORITHM II(AUTHENTICATING).
 CONCLUSION.
KEY WORDS
 kANN- k-Aggregated Nearest Neighbors.
 MUSQ- Multiple User-defined Spatial Queries.
 DOs- Data Owners.
 VO- Verification Object.
 ADS- Authenticated Data Structure.
 MHT- Merkle Hash Tree.
 SP- Service Provider.
 LBSs- Location-Based Services
 POI- Point-of-Interests.
WHAT IS IT?
 Multiple user decision making is important in to-day’s location-based
service scenarios.
 Existing query services such as kNN and Skyline queries only consider
single user and do not consider user’s preferences
 This system is designed using an authenticated query processing
framework based on MR-tree.
 Comprehensive experiments and Researchers have tested the
effectiveness and robustness of this query and its 100% functional.
CTd. WHAT IS IT?
It allows multiple users to define their own preferences because
it has more flexibility.
The query results are affected by spatial/non-spatial attributes
as well as users’ specified preferences.
THE PROBLEM WITH THE EXISTING
QUERIES
 Existing query services
such as kNN and Skyline queries only consider single
user and their algorithms
 it aims to process the query efficiently but not
considering the authentication problem.
ALREADY EXISTING QUERIES
• k-Nearest Neighbors (kNN) queries
• Skyline queries
• k-Aggregated Nearest Neighbors (kANN) queries
ADVANTAGES OF PROPOSED AMUSQ
 SOUNDNESS -every data item in the results comes from the original
database and is not tampered with by Service Provider.
 CORRECTIVENESS -every data item in the results satisfies users’ query
criteria.
 COMPLETENESS -every data item in the original database that satisfies
the query criteria is included in the results.
 Lastly this method is applied into multiple users decision making
scenarios, under which users form a group and query for the best
answers according to their locations and preferences.
HOW IT WORKS
 The figure in the next slide will show us how the authenticated query processing
framework under data outsourcing scenarios works.
 A data owner builds and signs an Authenticated Data Structure (ADS) for his/her
dataset when he/she delegates it to a Service Provider (SP). The Service Provider
(SP) processes a user’s query by returning the corresponding results and a
 Verification Object (VO). On receiving these information, the user recon-structs
querying results proof, and verifies their soundness, correctness, and
completeness with the published data owner’s signature
HOW IT WORKS
HOW IT WORKS
 As a typical example of MUSQ, Alice and Bob query for the best dinner
place considering distance, customers’ ratings and prices.
 Each has his/her own preference about these attributes.
 For example, Alice prefers distance most but does not care about prices
or customer ratings, while Bob prefers prices and customers’ ratings
more than distance.
HOW IT WORKS
 SP needs to retrieve the best dinner place satisfying both of their
requirements. A real application relevant to MUSQ is Baidu JuJu
introduced by Baidu company. As a highlight feature, Baidu JuJu makes
recommendation about the meeting spot for the user group based on
their locations.
 However, it takes no consideration about the non-spatial attributes and
users’ needs. If MUSQ is used in this scenario, different users’
requirements can be satisfied and the meeting spot can be selected
more.
OTHER AUTHENTICATED QUERY
PROCESSING
 Digital Signature Chaining – It was proposed to guarantee the
completeness of a dataset. It signs on adjacent data value, so that the
signature of each value depends both on its own value and its
immediate neighbor values.
 Merkle Hash Tree (MHT) -is an effective Authenticated Data Structure
(ADS) to authenticate a large set of data values. MHT is a binary tree that
stores data in its leaf node.
 Each leaf node has a digest generated by a one-way hash function H(·).
Each internal node has a digest of the concatenation of its children’s
digest. Only the root digest is signed by the data owner.
AUTHENTICATION OF SPECIAL CASES
 Authentication for Skyline Queries- A skyline query finds the optimal POIs
for the user con-sidering both spatial and non-spatial attributes.
 We can treat a skyline query as a special case of MUSQ when U = 1, W =
, and k is not defined.
 SP follows the same query process as MUSQ, except when calculating
vsum, no weights are needed.
 So the concept of weighted dominance no longer exists. SP only needs to
determine the dominance relation-ships among the visited MBRs or POI
objects during query processing.
CTd. AUTHENTICATION OF SPECIAL CASES
 Authentication for kNN and kANN Queries- When users only provide their
preferences on the spatial attribute the MUSQ can be considered as k-
aggregated nearest neighbor (kANN) queries.
 As a result, when dealing with dominance relationship between two objects,
only the aggregate distances are compared.
 The single parameter comparison results in a single POI results that dominates
all the remaining POIs. So k rounds are needed to find k aggregated nearest
neighbors. The VO construction follows the same process of the original queries.
 A kNN query returns k POI objects that are nearest to the querying user. It can
be considered as a special case of kANN when user set U contains only one
member.
CTd. AUTHENTICATION OF SPECIAL CASES
 Query processing remains the same, except the spatial attribute is
directly represented by the distance between the querying user and the
POI object.
 To authenticate the result, user also follows the process as:
 1. Compare the root digest
 2. Examine the dominance/weighted-dominance relationship of Gi and V
Oi .
 3. Verify that POIs in the higher ranked groups dominate/weighted-
dominate those in the lower ranked ones.
NOTATIONS
Symbol
Meanin
g
ui a user’s identifier
P the dataset of POIs
p a POI in P
W the weight set of U
w the weight of a user
♦(p)
the weighted sum of non-spatial attributes of
p
adsum(p) the weighted sum of distance from p to U
p, u Euclidean distance from p to u
R the query result set
•a group of querying users
TABLE III
VALUE STORAGE TABLE
Symbol
Meanin
g
ui a user’s identifier
P the dataset of POIs
p a POI in P
W the weight set of U
w the weight of a user
♦(p)
the weighted sum of non-spatial attributes of
p
adsum(p) the weighted sum of distance from p to U
p, u Euclidean distance from p to u
R the query result set
•a group of querying users
TABLE III
VALUE STORAGE TABLE
Symbol
Meanin
g
ui a user’s identifier
P the dataset of POIs
p a POI in P
W the weight set of U
w the weight of a user
♦(p)
the weighted sum of non-spatial attributes of
p
adsum(p) the weighted sum of distance from p to U
p, u Euclidean distance from p to u
R the query result set
•a group of querying users
TABLE III
VALUE STORAGE TABLE
Symbol
Meanin
g
ui a user’s identifier
P the dataset of POIs
p a POI in P
W the weight set of U
w the weight of a user
♦(p)
the weighted sum of non-spatial attributes of
p
adsum(p) the weighted sum of distance from p to U
p, u Euclidean distance from p to u
R the query result set
•a group of querying users
TABLE III
VALUE STORAGE TABLE
Symbol
Meanin
g
ui
a user’s identifier
P the dataset of POIs
p a POI in P
W the weight set of U
w the weight of a user
♦(p) the weighted sum of non-spatial attributes of p
adsum(p) the weighted sum of distance from p to U
p, u Euclidean distance from p to u
R the query result set
•a group of querying users
CRITERIA FOR DORMINACE
 if p and p_ satisfy the condition that (1) they cannot dominate each
 other, (2) the ♦(p_) is no larger than ♦(p), then we say p_
 weighted-dominates p on all non-spatial attributes.
SIGNING
 h = hash(MBR1|h1|MBR2|h2| ・ ・ ・ |MBRn|hn)
 Only the root node is signed by DO as Sig(hroot) using its private key.
 The leaf entry e3 stores the MBR N1, the pointer to POIs p1, p4 in N1, and the digest derived from p1, p4 as
 h(e3) = hash(p1|p4).
 The internal entry e1 stores the MBR N3, the pointer to the child MBRs N1,N2, and the digest
 derived from N1,N2 as h(e1) = hash(N1|h(e3)|N2|h(e4)).
 The root node digest is h(eroot) = hash(N3|h(e1)|N6|h(e2)).
 The root signature is generated by signing the digest of the root node eroot using the DO’s private key
MR TREE
CONDITIONING
• SP computes an additional value
 vsum for each node N of the MR-tree and each POI object p in the leaf node.
• vsum will be used to determine the traversal sequence of the MR-tree
 vsum(p) = adsum(p) + ♦(p)
• vsum(N) = min pi∈N (adsum(N.pi)) + min pj∈N (♦(N.pj))

• we must have vsum(p) < vsum(p_); if a POI p dominates or weighted dominates a
region S
QUEUING
The root node of MR-tree is added to H and VO at first
For each step, the top of H pops up,
SP examines whether the popped entry of H is dominated
or weighted-dominated by any existing objects in R.
the corresponding node or object is added into VO
OVERVIEW OF TRANSVERSAL
if it’s an internal node of MR-tree, its child nodes will
be added into H
if it’s a leaf node, all the POI objects covered by the
node will be added into H
if it’s a POI object, it will be added directly into R
CONDITIONS FOR ACCEPTING RESULT
 If _R_ > k, the number of query result exceeds users’ requirements, They
mark the top-k POIs as the final result according to their values of
vsum, then adds the rest into VO
 If _R_ = k, it means the result set can exactly meet users’ requirements
 If _R_ < k, a second round query is needed because the number of
result set from the first round query cannot satisfy users’ preferences
 k is an optional parameter. If it’s not defined by U, SP should return all
the calculated result objects of the first round in R.
THE CONTAINED ITEMS FOR EVERY (VO)
(1) The POI objects,
(2) The MBRs along with theirs digests, and
(3) All users’ query information U and W.
ALGORITHM 1(QUERY PROCESSING)
ALGORITHM II(AUTHENTICATING)
CONCLUSION
This scheme enables the query processing to generate
results and proofs that to check each result is sound, correct
and complete.
 Through theoretical proof and performance evaluation, it
shows that this framework is not only feasible, but also
efficient and robust under various parameter settings.
END OF PRESENTATION
THANK YOU!

More Related Content

What's hot

QUALITY OF CLUSTER INDEX BASED ON STUDY OF DECISION TREE
QUALITY OF CLUSTER INDEX BASED ON STUDY OF DECISION TREE QUALITY OF CLUSTER INDEX BASED ON STUDY OF DECISION TREE
QUALITY OF CLUSTER INDEX BASED ON STUDY OF DECISION TREE IJORCS
 
Parallel kmeans clustering in Erlang
Parallel kmeans clustering in ErlangParallel kmeans clustering in Erlang
Parallel kmeans clustering in ErlangChinmay Patel
 
Analysis of mass based and density based clustering techniques on numerical d...
Analysis of mass based and density based clustering techniques on numerical d...Analysis of mass based and density based clustering techniques on numerical d...
Analysis of mass based and density based clustering techniques on numerical d...Alexander Decker
 
Designing States, Actions, and Rewards for Using POMDP in Session Search
Designing States, Actions, and Rewards for Using POMDP in Session SearchDesigning States, Actions, and Rewards for Using POMDP in Session Search
Designing States, Actions, and Rewards for Using POMDP in Session SearchGrace Yang
 
Improved text clustering with
Improved text clustering withImproved text clustering with
Improved text clustering withIJDKP
 

What's hot (10)

QUALITY OF CLUSTER INDEX BASED ON STUDY OF DECISION TREE
QUALITY OF CLUSTER INDEX BASED ON STUDY OF DECISION TREE QUALITY OF CLUSTER INDEX BASED ON STUDY OF DECISION TREE
QUALITY OF CLUSTER INDEX BASED ON STUDY OF DECISION TREE
 
G0354451
G0354451G0354451
G0354451
 
Parallel kmeans clustering in Erlang
Parallel kmeans clustering in ErlangParallel kmeans clustering in Erlang
Parallel kmeans clustering in Erlang
 
Analysis of mass based and density based clustering techniques on numerical d...
Analysis of mass based and density based clustering techniques on numerical d...Analysis of mass based and density based clustering techniques on numerical d...
Analysis of mass based and density based clustering techniques on numerical d...
 
20120140505011
2012014050501120120140505011
20120140505011
 
Icmtea
IcmteaIcmtea
Icmtea
 
E1062530
E1062530E1062530
E1062530
 
Clustering
ClusteringClustering
Clustering
 
Designing States, Actions, and Rewards for Using POMDP in Session Search
Designing States, Actions, and Rewards for Using POMDP in Session SearchDesigning States, Actions, and Rewards for Using POMDP in Session Search
Designing States, Actions, and Rewards for Using POMDP in Session Search
 
Improved text clustering with
Improved text clustering withImproved text clustering with
Improved text clustering with
 

Similar to Authenticating multiple user defined spatial queries.

Spatial query integrity with voronoi neighbors
Spatial query integrity with voronoi neighborsSpatial query integrity with voronoi neighbors
Spatial query integrity with voronoi neighborsJPINFOTECH JAYAPRAKASH
 
Enhanced Methodology for supporting approximate string search in Geospatial ...
Enhanced Methodology for supporting approximate string search  in Geospatial ...Enhanced Methodology for supporting approximate string search  in Geospatial ...
Enhanced Methodology for supporting approximate string search in Geospatial ...IJMER
 
Authenticating Location Based Skyline Queries in Mobile Environment
Authenticating Location Based Skyline Queries in Mobile EnvironmentAuthenticating Location Based Skyline Queries in Mobile Environment
Authenticating Location Based Skyline Queries in Mobile EnvironmentEditor IJCATR
 
Evaluation of Uncertain Location
Evaluation of Uncertain Location Evaluation of Uncertain Location
Evaluation of Uncertain Location IOSR Journals
 
report2.doc
report2.docreport2.doc
report2.docbutest
 
IRJET- Explore the World
IRJET- 	  Explore the WorldIRJET- 	  Explore the World
IRJET- Explore the WorldIRJET Journal
 
ICFHR 2014 Competition on Handwritten KeyWord Spotting (H-KWS 2014)
ICFHR 2014 Competition on Handwritten KeyWord Spotting (H-KWS 2014)ICFHR 2014 Competition on Handwritten KeyWord Spotting (H-KWS 2014)
ICFHR 2014 Competition on Handwritten KeyWord Spotting (H-KWS 2014)Konstantinos Zagoris
 
Spatial analysis & interpolation in ARC GIS
Spatial analysis & interpolation in ARC GISSpatial analysis & interpolation in ARC GIS
Spatial analysis & interpolation in ARC GISKU Leuven
 
Aggregation of data by using top k spatial query preferences
Aggregation of data by using top  k spatial query preferencesAggregation of data by using top  k spatial query preferences
Aggregation of data by using top k spatial query preferencesAlexander Decker
 
Spatial analysis and Analysis Tools
Spatial analysis and Analysis ToolsSpatial analysis and Analysis Tools
Spatial analysis and Analysis ToolsSwapnil Shrivastav
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
ROMAN URDU OPINION MINING SYSTEM (RUOMIS)
ROMAN URDU OPINION MINING SYSTEM (RUOMIS) ROMAN URDU OPINION MINING SYSTEM (RUOMIS)
ROMAN URDU OPINION MINING SYSTEM (RUOMIS) cseij
 
Hybrid geo textual index structure
Hybrid geo textual index structureHybrid geo textual index structure
Hybrid geo textual index structurecseij
 
Semantics and optimisation of the SPARQL1.1 federation extension
Semantics and optimisation of the SPARQL1.1 federation extensionSemantics and optimisation of the SPARQL1.1 federation extension
Semantics and optimisation of the SPARQL1.1 federation extensionOscar Corcho
 
Computing Neighbourhoods with Language Models in a Collaborative Filtering Sc...
Computing Neighbourhoods with Language Models in a Collaborative Filtering Sc...Computing Neighbourhoods with Language Models in a Collaborative Filtering Sc...
Computing Neighbourhoods with Language Models in a Collaborative Filtering Sc...Daniel Valcarce
 
Workflow Provenance: From Modelling to Reporting
Workflow Provenance: From Modelling to ReportingWorkflow Provenance: From Modelling to Reporting
Workflow Provenance: From Modelling to ReportingRayhan Ferdous
 
CSTalks-Quaternary Semantics Recomandation System-24 Aug
CSTalks-Quaternary Semantics Recomandation System-24 AugCSTalks-Quaternary Semantics Recomandation System-24 Aug
CSTalks-Quaternary Semantics Recomandation System-24 Augcstalks
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 

Similar to Authenticating multiple user defined spatial queries. (20)

Spatial query integrity with voronoi neighbors
Spatial query integrity with voronoi neighborsSpatial query integrity with voronoi neighbors
Spatial query integrity with voronoi neighbors
 
Enhanced Methodology for supporting approximate string search in Geospatial ...
Enhanced Methodology for supporting approximate string search  in Geospatial ...Enhanced Methodology for supporting approximate string search  in Geospatial ...
Enhanced Methodology for supporting approximate string search in Geospatial ...
 
Authenticating Location Based Skyline Queries in Mobile Environment
Authenticating Location Based Skyline Queries in Mobile EnvironmentAuthenticating Location Based Skyline Queries in Mobile Environment
Authenticating Location Based Skyline Queries in Mobile Environment
 
Evaluation of Uncertain Location
Evaluation of Uncertain Location Evaluation of Uncertain Location
Evaluation of Uncertain Location
 
report2.doc
report2.docreport2.doc
report2.doc
 
IRJET- Explore the World
IRJET- 	  Explore the WorldIRJET- 	  Explore the World
IRJET- Explore the World
 
ICFHR 2014 Competition on Handwritten KeyWord Spotting (H-KWS 2014)
ICFHR 2014 Competition on Handwritten KeyWord Spotting (H-KWS 2014)ICFHR 2014 Competition on Handwritten KeyWord Spotting (H-KWS 2014)
ICFHR 2014 Competition on Handwritten KeyWord Spotting (H-KWS 2014)
 
Spatial analysis & interpolation in ARC GIS
Spatial analysis & interpolation in ARC GISSpatial analysis & interpolation in ARC GIS
Spatial analysis & interpolation in ARC GIS
 
Aggregation of data by using top k spatial query preferences
Aggregation of data by using top  k spatial query preferencesAggregation of data by using top  k spatial query preferences
Aggregation of data by using top k spatial query preferences
 
Cg4201552556
Cg4201552556Cg4201552556
Cg4201552556
 
Spatial analysis and Analysis Tools
Spatial analysis and Analysis ToolsSpatial analysis and Analysis Tools
Spatial analysis and Analysis Tools
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
H1076875
H1076875H1076875
H1076875
 
ROMAN URDU OPINION MINING SYSTEM (RUOMIS)
ROMAN URDU OPINION MINING SYSTEM (RUOMIS) ROMAN URDU OPINION MINING SYSTEM (RUOMIS)
ROMAN URDU OPINION MINING SYSTEM (RUOMIS)
 
Hybrid geo textual index structure
Hybrid geo textual index structureHybrid geo textual index structure
Hybrid geo textual index structure
 
Semantics and optimisation of the SPARQL1.1 federation extension
Semantics and optimisation of the SPARQL1.1 federation extensionSemantics and optimisation of the SPARQL1.1 federation extension
Semantics and optimisation of the SPARQL1.1 federation extension
 
Computing Neighbourhoods with Language Models in a Collaborative Filtering Sc...
Computing Neighbourhoods with Language Models in a Collaborative Filtering Sc...Computing Neighbourhoods with Language Models in a Collaborative Filtering Sc...
Computing Neighbourhoods with Language Models in a Collaborative Filtering Sc...
 
Workflow Provenance: From Modelling to Reporting
Workflow Provenance: From Modelling to ReportingWorkflow Provenance: From Modelling to Reporting
Workflow Provenance: From Modelling to Reporting
 
CSTalks-Quaternary Semantics Recomandation System-24 Aug
CSTalks-Quaternary Semantics Recomandation System-24 AugCSTalks-Quaternary Semantics Recomandation System-24 Aug
CSTalks-Quaternary Semantics Recomandation System-24 Aug
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 

More from Ewald Erubaar Kuupole

201824010002 kuupole eru baar ewald using cnn with extracted facial patches t...
201824010002 kuupole eru baar ewald using cnn with extracted facial patches t...201824010002 kuupole eru baar ewald using cnn with extracted facial patches t...
201824010002 kuupole eru baar ewald using cnn with extracted facial patches t...Ewald Erubaar Kuupole
 
An automatic dermatology diagnosis using convolutional neural network
An automatic dermatology diagnosis using convolutional neural networkAn automatic dermatology diagnosis using convolutional neural network
An automatic dermatology diagnosis using convolutional neural networkEwald Erubaar Kuupole
 
My personal experience in China Essay 2018
My personal experience in China Essay 2018My personal experience in China Essay 2018
My personal experience in China Essay 2018Ewald Erubaar Kuupole
 
An orphanage home management system eek
An orphanage home management system eekAn orphanage home management system eek
An orphanage home management system eekEwald Erubaar Kuupole
 
In the name of revenge:Ewald E kuupole
In the name of revenge:Ewald E kuupoleIn the name of revenge:Ewald E kuupole
In the name of revenge:Ewald E kuupoleEwald Erubaar Kuupole
 

More from Ewald Erubaar Kuupole (7)

201824010002 kuupole eru baar ewald using cnn with extracted facial patches t...
201824010002 kuupole eru baar ewald using cnn with extracted facial patches t...201824010002 kuupole eru baar ewald using cnn with extracted facial patches t...
201824010002 kuupole eru baar ewald using cnn with extracted facial patches t...
 
TORTIN GHANA
TORTIN GHANATORTIN GHANA
TORTIN GHANA
 
An automatic dermatology diagnosis using convolutional neural network
An automatic dermatology diagnosis using convolutional neural networkAn automatic dermatology diagnosis using convolutional neural network
An automatic dermatology diagnosis using convolutional neural network
 
My personal experience in China Essay 2018
My personal experience in China Essay 2018My personal experience in China Essay 2018
My personal experience in China Essay 2018
 
Orphanage Home Management System
Orphanage Home Management SystemOrphanage Home Management System
Orphanage Home Management System
 
An orphanage home management system eek
An orphanage home management system eekAn orphanage home management system eek
An orphanage home management system eek
 
In the name of revenge:Ewald E kuupole
In the name of revenge:Ewald E kuupoleIn the name of revenge:Ewald E kuupole
In the name of revenge:Ewald E kuupole
 

Recently uploaded

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Authenticating multiple user defined spatial queries.

  • 1. AUTHENTICATING MULTIPLE USER-DEFINED SPATIAL QUERIES (AMUDSG) A PRESENTATION BY: KUUPOLE ERU-BAAR EWALD – 201824010002 & BONSU ADJEI-ARTHUR- 201824080009
  • 2. CONTENTS  KEY WORDS.  WHAT IS IT?.  ADVANTAGES OF PROPOSED AMUSQ.  HOW IT WORKS.  THE PROBLEM WITH EXISTING QUERIES.  ALREADY EXISTING QUERIES.  OTHER AUTHENTICATED QUERY PROCESSING.  AUTHENTICATION OF SPECIAL CASES.  NOTATIONS.  CRITERIA FOR DORMINACE.  SIGNING.  MR TREE.  CONDITIONING.  QUEUING.  OVERVIEW OF TRANSVERSAL.  CONDITIONS FOR ACCEPTING RESULT.  THE CONTAINED ITEMS FOR EVERY (VO).  ALGORITHM 1(QUERY PROCESSING).  ALGORITHM II(AUTHENTICATING).  CONCLUSION.
  • 3. KEY WORDS  kANN- k-Aggregated Nearest Neighbors.  MUSQ- Multiple User-defined Spatial Queries.  DOs- Data Owners.  VO- Verification Object.  ADS- Authenticated Data Structure.  MHT- Merkle Hash Tree.  SP- Service Provider.  LBSs- Location-Based Services  POI- Point-of-Interests.
  • 4. WHAT IS IT?  Multiple user decision making is important in to-day’s location-based service scenarios.  Existing query services such as kNN and Skyline queries only consider single user and do not consider user’s preferences  This system is designed using an authenticated query processing framework based on MR-tree.  Comprehensive experiments and Researchers have tested the effectiveness and robustness of this query and its 100% functional.
  • 5. CTd. WHAT IS IT? It allows multiple users to define their own preferences because it has more flexibility. The query results are affected by spatial/non-spatial attributes as well as users’ specified preferences.
  • 6. THE PROBLEM WITH THE EXISTING QUERIES  Existing query services such as kNN and Skyline queries only consider single user and their algorithms  it aims to process the query efficiently but not considering the authentication problem.
  • 7. ALREADY EXISTING QUERIES • k-Nearest Neighbors (kNN) queries • Skyline queries • k-Aggregated Nearest Neighbors (kANN) queries
  • 8. ADVANTAGES OF PROPOSED AMUSQ  SOUNDNESS -every data item in the results comes from the original database and is not tampered with by Service Provider.  CORRECTIVENESS -every data item in the results satisfies users’ query criteria.  COMPLETENESS -every data item in the original database that satisfies the query criteria is included in the results.  Lastly this method is applied into multiple users decision making scenarios, under which users form a group and query for the best answers according to their locations and preferences.
  • 9. HOW IT WORKS  The figure in the next slide will show us how the authenticated query processing framework under data outsourcing scenarios works.  A data owner builds and signs an Authenticated Data Structure (ADS) for his/her dataset when he/she delegates it to a Service Provider (SP). The Service Provider (SP) processes a user’s query by returning the corresponding results and a  Verification Object (VO). On receiving these information, the user recon-structs querying results proof, and verifies their soundness, correctness, and completeness with the published data owner’s signature
  • 11. HOW IT WORKS  As a typical example of MUSQ, Alice and Bob query for the best dinner place considering distance, customers’ ratings and prices.  Each has his/her own preference about these attributes.  For example, Alice prefers distance most but does not care about prices or customer ratings, while Bob prefers prices and customers’ ratings more than distance.
  • 12. HOW IT WORKS  SP needs to retrieve the best dinner place satisfying both of their requirements. A real application relevant to MUSQ is Baidu JuJu introduced by Baidu company. As a highlight feature, Baidu JuJu makes recommendation about the meeting spot for the user group based on their locations.  However, it takes no consideration about the non-spatial attributes and users’ needs. If MUSQ is used in this scenario, different users’ requirements can be satisfied and the meeting spot can be selected more.
  • 13. OTHER AUTHENTICATED QUERY PROCESSING  Digital Signature Chaining – It was proposed to guarantee the completeness of a dataset. It signs on adjacent data value, so that the signature of each value depends both on its own value and its immediate neighbor values.  Merkle Hash Tree (MHT) -is an effective Authenticated Data Structure (ADS) to authenticate a large set of data values. MHT is a binary tree that stores data in its leaf node.  Each leaf node has a digest generated by a one-way hash function H(·). Each internal node has a digest of the concatenation of its children’s digest. Only the root digest is signed by the data owner.
  • 14. AUTHENTICATION OF SPECIAL CASES  Authentication for Skyline Queries- A skyline query finds the optimal POIs for the user con-sidering both spatial and non-spatial attributes.  We can treat a skyline query as a special case of MUSQ when U = 1, W = , and k is not defined.  SP follows the same query process as MUSQ, except when calculating vsum, no weights are needed.  So the concept of weighted dominance no longer exists. SP only needs to determine the dominance relation-ships among the visited MBRs or POI objects during query processing.
  • 15. CTd. AUTHENTICATION OF SPECIAL CASES  Authentication for kNN and kANN Queries- When users only provide their preferences on the spatial attribute the MUSQ can be considered as k- aggregated nearest neighbor (kANN) queries.  As a result, when dealing with dominance relationship between two objects, only the aggregate distances are compared.  The single parameter comparison results in a single POI results that dominates all the remaining POIs. So k rounds are needed to find k aggregated nearest neighbors. The VO construction follows the same process of the original queries.  A kNN query returns k POI objects that are nearest to the querying user. It can be considered as a special case of kANN when user set U contains only one member.
  • 16. CTd. AUTHENTICATION OF SPECIAL CASES  Query processing remains the same, except the spatial attribute is directly represented by the distance between the querying user and the POI object.  To authenticate the result, user also follows the process as:  1. Compare the root digest  2. Examine the dominance/weighted-dominance relationship of Gi and V Oi .  3. Verify that POIs in the higher ranked groups dominate/weighted- dominate those in the lower ranked ones.
  • 17. NOTATIONS Symbol Meanin g ui a user’s identifier P the dataset of POIs p a POI in P W the weight set of U w the weight of a user ♦(p) the weighted sum of non-spatial attributes of p adsum(p) the weighted sum of distance from p to U p, u Euclidean distance from p to u R the query result set •a group of querying users TABLE III VALUE STORAGE TABLE Symbol Meanin g ui a user’s identifier P the dataset of POIs p a POI in P W the weight set of U w the weight of a user ♦(p) the weighted sum of non-spatial attributes of p adsum(p) the weighted sum of distance from p to U p, u Euclidean distance from p to u R the query result set •a group of querying users TABLE III VALUE STORAGE TABLE Symbol Meanin g ui a user’s identifier P the dataset of POIs p a POI in P W the weight set of U w the weight of a user ♦(p) the weighted sum of non-spatial attributes of p adsum(p) the weighted sum of distance from p to U p, u Euclidean distance from p to u R the query result set •a group of querying users TABLE III VALUE STORAGE TABLE Symbol Meanin g ui a user’s identifier P the dataset of POIs p a POI in P W the weight set of U w the weight of a user ♦(p) the weighted sum of non-spatial attributes of p adsum(p) the weighted sum of distance from p to U p, u Euclidean distance from p to u R the query result set •a group of querying users TABLE III VALUE STORAGE TABLE Symbol Meanin g ui a user’s identifier P the dataset of POIs p a POI in P W the weight set of U w the weight of a user ♦(p) the weighted sum of non-spatial attributes of p adsum(p) the weighted sum of distance from p to U p, u Euclidean distance from p to u R the query result set •a group of querying users
  • 18. CRITERIA FOR DORMINACE  if p and p_ satisfy the condition that (1) they cannot dominate each  other, (2) the ♦(p_) is no larger than ♦(p), then we say p_  weighted-dominates p on all non-spatial attributes.
  • 19. SIGNING  h = hash(MBR1|h1|MBR2|h2| ・ ・ ・ |MBRn|hn)  Only the root node is signed by DO as Sig(hroot) using its private key.  The leaf entry e3 stores the MBR N1, the pointer to POIs p1, p4 in N1, and the digest derived from p1, p4 as  h(e3) = hash(p1|p4).  The internal entry e1 stores the MBR N3, the pointer to the child MBRs N1,N2, and the digest  derived from N1,N2 as h(e1) = hash(N1|h(e3)|N2|h(e4)).  The root node digest is h(eroot) = hash(N3|h(e1)|N6|h(e2)).  The root signature is generated by signing the digest of the root node eroot using the DO’s private key
  • 21. CONDITIONING • SP computes an additional value  vsum for each node N of the MR-tree and each POI object p in the leaf node. • vsum will be used to determine the traversal sequence of the MR-tree  vsum(p) = adsum(p) + ♦(p) • vsum(N) = min pi∈N (adsum(N.pi)) + min pj∈N (♦(N.pj))  • we must have vsum(p) < vsum(p_); if a POI p dominates or weighted dominates a region S
  • 22. QUEUING The root node of MR-tree is added to H and VO at first For each step, the top of H pops up, SP examines whether the popped entry of H is dominated or weighted-dominated by any existing objects in R. the corresponding node or object is added into VO
  • 23. OVERVIEW OF TRANSVERSAL if it’s an internal node of MR-tree, its child nodes will be added into H if it’s a leaf node, all the POI objects covered by the node will be added into H if it’s a POI object, it will be added directly into R
  • 24.
  • 25. CONDITIONS FOR ACCEPTING RESULT  If _R_ > k, the number of query result exceeds users’ requirements, They mark the top-k POIs as the final result according to their values of vsum, then adds the rest into VO  If _R_ = k, it means the result set can exactly meet users’ requirements  If _R_ < k, a second round query is needed because the number of result set from the first round query cannot satisfy users’ preferences  k is an optional parameter. If it’s not defined by U, SP should return all the calculated result objects of the first round in R.
  • 26. THE CONTAINED ITEMS FOR EVERY (VO) (1) The POI objects, (2) The MBRs along with theirs digests, and (3) All users’ query information U and W.
  • 29. CONCLUSION This scheme enables the query processing to generate results and proofs that to check each result is sound, correct and complete.  Through theoretical proof and performance evaluation, it shows that this framework is not only feasible, but also efficient and robust under various parameter settings.