A New Spatial Transformation Scheme for Preventing Location Data Disclosure in Cloud Computing

A New Spatial Transformation Scheme for Preventing Location Data Disclosure in Cloud Computing

Min Yoon, Hyeong-il Kim, Miyoung Jang, Jae-Woo Chang
ISBN13: 9781466698451|ISBN10: 1466698454|EISBN13: 9781466698468
DOI: 10.4018/978-1-4666-9845-1.ch084
Cite Chapter Cite Chapter

MLA

Yoon, Min, et al. "A New Spatial Transformation Scheme for Preventing Location Data Disclosure in Cloud Computing." Geospatial Research: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2016, pp. 1752-1776. https://doi.org/10.4018/978-1-4666-9845-1.ch084

APA

Yoon, M., Kim, H., Jang, M., & Chang, J. (2016). A New Spatial Transformation Scheme for Preventing Location Data Disclosure in Cloud Computing. In I. Management Association (Ed.), Geospatial Research: Concepts, Methodologies, Tools, and Applications (pp. 1752-1776). IGI Global. https://doi.org/10.4018/978-1-4666-9845-1.ch084

Chicago

Yoon, Min, et al. "A New Spatial Transformation Scheme for Preventing Location Data Disclosure in Cloud Computing." In Geospatial Research: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1752-1776. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-4666-9845-1.ch084

Export Reference

Mendeley
Favorite

Abstract

Because much interest in spatial database for cloud computing has been attracted, studies on preserving location data privacy have been actively done. However, since the existing spatial transformation schemes are weak to a proximity attack, they cannot preserve the privacy of users who enjoy location-based services in the cloud computing. Therefore, a transformation scheme is required for providing a safe service to users. We, in this chapter, propose a new transformation scheme based on a line symmetric transformation (LST). The proposed scheme performs both LST-based data distribution and error injection transformation for preventing a proximity attack effectively. Finally, we show from our performance analysis that the proposed scheme greatly reduces the success rate of the proximity attack while performing the spatial transformation in an efficient way.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.