SLGP Header

Superior Seclusion over Confirmation of K-Nearest Neighbor Enquiry on Spatial Network

IJCSEC Front Page

Safety measure is budding to be a vital aspect to be taken into our mind due to the eternally altering earth of worldwide facts communications, low-priced Internet connections, and fast-budding technology development. One of the elementary prerequisite is security since many of world wide computing seems to be not secured. When the information takes a trip via Internet it has a wide variety of intermediate points and it gets easily hacked despite of many safety techniques. Generally a customer when screens for an particular data, the search section is the area where the customer enter his query for which the customer needs to get the particular data While surfing the customer information such as IP address of the customer, region of customer will be stored in the outside people owned server. Since many of the outside people owned servers does not provide elevated security for user information such as area when gets hacked by some unauthenticated person then it will cause several sufferings to the authorized customer. The key idea is to focus on the safekeeping of the user. Combination of Hilbert space filling transformation and Voronoi Network provide better results when compared with existing techniques in this domain.
Key Terms: Hilbert Curve, Voronoi Network, Hilbert filling Transformation.
Locality based Services is termed as one of the backbone in development of human community .Spatial databases act as an repository for storing locality based information .Commercial servers are used to hold on spatial databases. Cyber crime is a boning technology with a huge people interested in hacking of some external member information. External member information when gets used by unauthorized person show the way to an insecure environment .Consequences faced by the people due security lacking includes illegal use of external member information. In these conditions, it is highly important to focus on pre cautions necessary to protect the consumers. The existing methodology implements Network Voronoi diagram. The objective of Network Voronoi is to provide low-level security by means of its internal structure. To provide enlarged security the proposed work applies Hilbert Transformation methodology over the Network Voronoi as a result enlarged level of security is provided to user data. Searching for concealed patterns from large data storage locations is formalized as Data mining. SDM(Spatial Data mining) is the process of discovering fascinating and unexplored, potentially useful patterns from large spatial data warehouses.SDM is used to find implicit and explicit regularities, relations between spatial data and non-spatial data. Data is termed as raw fact that provides certain kind of data to the user. A special kind of data is the spatial data. Data that deals with the positions and dimensions is defined as spatial data. Spatial databases are specialized medium for storing spatial data. Geographical objects are represented by means of their position and dimensions. The facts related to objects are interpreted in the form of spatial data. Spatial data appears in the form of raw item or complete information that determines the geographic position of features and determines whether position is either natural or constructed manually .There are two main forms of a spatial data .Spatial Data may be either continuous or discrete. Discrete means non continuous objects represent an area. Continuous means collectively objects represent an area.
Spatial databases are specialized databases that have wide variety of applications such as Multimedia, Geographical Information System and Designing and Manufacturing. Spatial databases manipulate process, store and retrieve spatial data. It classifies efficiently the attributes of an object. The attributes of an object can either be spatial or non-spatial. A spatial database uses a special type of data structure called as indexing .Indexing is of two types Single and Multiple Dimension Indexing. Tree data structure is used in construction of Spatial Databases. Trees mainly implemented are B+ tree and R tree.
Outsourcing is interpreted as spending to some arbitrator for finishing a particular work. The arbitrator in turns select people for the end of the work. The method of handling geospatial data gets easier by the Information Holder by creating a new contract handling environment. The information holder (IH) substitute the management of its database to a third-party Cloud Utility Provider, the Utility Provider (UP) is responsible for classifying the data, responding to the client queries, and upgrading the data on requests from the IH’s. A mobile patron used to send their questions to UP’s, now submitted questions to UP and retrieve results from UP directly. For example, Migrating Bing Maps partners with Tele Atlas, a major provider of base electronic navigable maps, to provide web mapping services for the public. In this case, Tele Atlas is the IH, and Bing Maps is the access provider (UP)[1]Cloud computing is a network of networks providing remote access to a set of fragmented IT assets and offers expandable assets depending on the needs of the user due to which the expenditure of the user spent in terms of installation ,maintenance gets reduced for the Information Holder.
Most exciting area in field of study is cloud computing. Due to its wide variety of properties and a special property named as “any time any where access” it sounds high in the field of Research and Development. Although database outsourcing provides information holder with a more efficient, economical, and flexible solution, it also introduces new concerns. The query authenticity concern means to ensure that the query results returned by UP are still reliable. As Utility Provider UP is not the real possessor of the data, it might return incorrect results to mobile consumers out of its own interests, for example, an UP which hosts collection of cafés might favor some that pay more commercial fees. Moreover, an UP might return suboptimal results to query clients by applying flawed or substandard algorithms in order to save estimation resources. Therefore, providing a mechanism that allows clients to authenticate the precision and completeness of the query result is necessary. Specifically, correctness means all data returned by UP originate from IH without any forgery and the query result is matching to that computed by IH. Completeness means all qualified results have been included by UP in the result set.


  1. Cyrus Shahabi, Ling Hu, Wei-Shinn Ku, YinanJing,“Authentication of k Nearest Neighbor Query on Road Networks,” IEEE VOL. 26, NO. 6, JUNE 2014
  2. U. Demiryurek and C. Shahabi, “Indexing network Voronoi diagrams,” in Proc. 17th Int. Conf. DASFAA, Bussan, South Korea, 2012, pp. 526-537.
  3. M..Erwing, “The graph Voronoi diagram with Applications,”Network vol. 36, no. 3, pp. 156-163, Oct.2012.
  4. Franceso Bonchi, George Kollios, Aristides Gionis, Michalis Potamias,“K-Nearest Neighbors in Uncertain Graphs,” J.Comput.Secur., vol. 16 2012.
  5. Haixun Wang, LinLiu, Bolin Ding, Ruoming Jin, “Distance-Constraint Reachability Computation in Uncertain Graphs,” vol. 17, no. 1, pp. 50-92, 2011.
  6. P. Karras, D. Pappadias, S. Papadopoulos, L. Wang, Y. Yang, “Authenticated Multi step Nearest Neighbor Search,” IEEE Trans. Knowl. Data Eng., vol 23, no. 5, pp.641-654, May 2011.
  7. G. Kollios, S. Papadopoulos, D. Pappadias, Y. Yang, “Spatial outsourcing for location based services, Proc.IEEE 24th ICDE, Cancun, Mexico 2009, pp.1082 - 1091.
  8. K.C.K. Lee, W.C. Lee, B. Zheng, Y. Tian, “ROAD: A new spatial object search framework for road network,” IEEE Trans. Knowl, DataEng., vol. 24, no.3, pp.547- 560Mar 2012.
  9. C.E. Leiserson, T. H. Cormen, R..L. Rivest and C.Stein, “Introduction to algorithms”,Cambridge, MA,USA.(2009-MIT PRESS)
  10. K. Mouratidis, D. Sacharidis and H. Pang, “Partially Materialized Digest Scheme: An efficient verification method for outsourced databases,” VLDBJ.,vol. 18, no. 1, pp.363-381, 2009.
  11. MITPRESS, 2009.\