{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T09:44:23Z","timestamp":1753868663993,"version":"3.41.2"},"reference-count":45,"publisher":"Wiley","issue":"14","license":[{"start":{"date-parts":[[2020,3,26]],"date-time":"2020-03-26T00:00:00Z","timestamp":1585180800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100004735","name":"Hunan Provincial Natural Science Foundation","doi-asserted-by":"publisher","award":["2017JJ2333"],"award-info":[{"award-number":["2017JJ2333"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472451","61632009"],"award-info":[{"award-number":["61472451","61632009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2017A030308006"],"award-info":[{"award-number":["2017A030308006"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2022,6,25]]},"abstract":"<jats:title>Summary<\/jats:title><jats:p>In recent times, many location\u2010based service providers (LBSPs) choose to outsource data query services to third\u2010party cloud service providers (CSPs). This allows users to easily search for points of interests (POIs), such as restaurants and parking lots in their vicinity, using their mobile devices and in\u2010vehicle infotainment units. Skyline query is one potential technique to be deployed for road networks. However, the untrusted CSPs may forge or omit query results, intentionally or not. Therefore, in this article, we posit that by observing the unique properties of skyline query results in road networks, we can bind each POI with four nearby POIs with special properties using signature chain technology. Our proposed approach not only provides users with skyline query result authentication ability over the road network, but also have low communication overhead. Specifically, the overhead analysis and experimental results show that our proposed approach decreases the communication overhead.<\/jats:p>","DOI":"10.1002\/cpe.5747","type":"journal-article","created":{"date-parts":[[2020,3,26]],"date-time":"2020-03-26T07:20:31Z","timestamp":1585207231000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On authenticated skyline query processing over road networks"],"prefix":"10.1002","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6815-3754","authenticated-orcid":false,"given":"Xiaoyu","family":"Zhu","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering Central South University  Changsha China"}]},{"given":"Jie","family":"Wu","sequence":"additional","affiliation":[{"name":"Center for Networked Computing Temple University  Philadelphia Pennsylvania USA"}]},{"given":"Wei","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Sciences Saint Joseph's University  Philadelphia Pennsylvania USA"}]},{"given":"Md","family":"Zakirul Alam Bhuiyan","sequence":"additional","affiliation":[{"name":"Department of Computer Science Fordham University  New York City New York USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9208-5336","authenticated-orcid":false,"given":"Kim\u2010Kwang","family":"Raymond Choo","sequence":"additional","affiliation":[{"name":"Department of Information Systems and Cyber Security University of Texas at San Antonio  San Antonio Texas USA"}]},{"given":"Fang","family":"Qi","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering Central South University  Changsha China"}]},{"given":"Qin","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Electronic Engineering Hunan University  Changsha China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9875-4182","authenticated-orcid":false,"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science Guangzhou University  Guangzhou China"}]}],"member":"311","published-online":{"date-parts":[[2020,3,26]]},"reference":[{"key":"e_1_2_10_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2842470"},{"key":"e_1_2_10_3_1","doi-asserted-by":"crossref","unstructured":"GoncalvesM TorresD PereraG. Making recommendations using location\u2010based skyline queries. Paper presented at: Proceedings of the 2012 23rd International Workshop on Database and Expert Systems Applications;2012:111\u2010115; IEEE.","DOI":"10.1109\/DEXA.2012.44"},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2951857"},{"key":"e_1_2_10_5_1","doi-asserted-by":"crossref","unstructured":"WangN WuJ. Optimal cloud instance acquisition via IaaS cloud brokerage with volume discount. Paper presented at: Proceedings of the 2018 IEEE\/ACM 26th International Symposium on Quality of Service (IWQoS);20181\u201010; IEEE.","DOI":"10.1109\/IWQoS.2018.8624186"},{"key":"e_1_2_10_6_1","unstructured":"KhandelwalSwati. Download: 68 million hacked dropbox accounts are just a click away!https:\/\/thehackernews.com\/2016\/10\/dropbox\u2010password\u2010hack.html. Accessed October 4 2016."},{"key":"e_1_2_10_7_1","unstructured":"McGeeMarianne Kolbasuk. Blood test results exposed in cloud repository.https:\/\/www.databreachtoday.com\/blood\u2010test\u2010results\u2010exposed\u2010in\u2010cloud\u2010repository\u2010a\u201010382. Accessed October 16 2017."},{"key":"e_1_2_10_8_1","doi-asserted-by":"crossref","unstructured":"ChenW LiuM ZhangR ZhangY LiuS. Secure outsourced skyline query processing via untrusted cloud service providers. Paper presented at: Proceedings of the IEEE INFOCOM 2016\u2010The 35th Annual IEEE International Conference on Computer Communications;2016:1\u20109; IEEE.","DOI":"10.1109\/INFOCOM.2016.7524509"},{"key":"e_1_2_10_9_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2003-11302"},{"key":"e_1_2_10_10_1","doi-asserted-by":"crossref","unstructured":"LiF HadjieleftheriouM KolliosG ReyzinL. Dynamic authenticated index structures for outsourced databases. Paper presented at: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data;2006:121\u2010132; ACM.","DOI":"10.1145\/1142473.1142488"},{"key":"e_1_2_10_11_1","doi-asserted-by":"crossref","unstructured":"KuWS HuL ShahabiC WangH. Query integrity assurance of location\u2010based services accessing outsourced spatial databases. Paper presented at: Proceedings of the International Symposium on Spatial and Temporal Databases;2009:80\u201097; Berlin Heidelberg \/ Germany Springer.","DOI":"10.1007\/978-3-642-02982-0_8"},{"key":"e_1_2_10_12_1","doi-asserted-by":"crossref","unstructured":"YiuML LinY MouratidisK. Efficient verification of shortest path search via authenticated hints. Paper presented at: Proceedings of the 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010);2010:237\u2010248; IEEE.","DOI":"10.1109\/ICDE.2010.5447914"},{"key":"e_1_2_10_13_1","doi-asserted-by":"crossref","unstructured":"PangH JainA RamamrithamK TanKL. Verifying completeness of relational query results in data publishing. Paper presented at: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data;2005:407\u2010418; ACM.","DOI":"10.1145\/1066157.1066204"},{"key":"e_1_2_10_14_1","doi-asserted-by":"crossref","unstructured":"NarasimhaM TsudikG. Authentication of outsourced databases using signature aggregation and chaining. Pape presented at: Proceedings of the International Conference on Database Systems for Advanced Applications;2006:420\u2010436; Springer.","DOI":"10.1007\/11733836_30"},{"key":"e_1_2_10_15_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687718"},{"key":"e_1_2_10_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2888564"},{"key":"e_1_2_10_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-008-0113-2"},{"key":"e_1_2_10_18_1","doi-asserted-by":"crossref","unstructured":"HuH XuJ ChenQ YangZ. Authenticating location\u2010based services without compromising location privacy. Paper presented at: Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data;2012:301\u2010312; ACM.","DOI":"10.1145\/2213836.2213871"},{"key":"e_1_2_10_19_1","doi-asserted-by":"crossref","unstructured":"ZhuX WuJ ChangW WangG LiuQ. Authentication of multi\u2010dimensional top\u2010Kquery on untrusted server. Paper presented at: Proceedings of the 2018 IEEE\/ACM 26th International Symposium on Quality of Service;2018:1\u20106.","DOI":"10.1109\/IWQoS.2018.8624145"},{"key":"e_1_2_10_20_1","doi-asserted-by":"crossref","unstructured":"ZhangR ZhangY ZhangC. Secure top\u2010k query processing via untrusted location\u2010based service providers. Paper presented at: Proceedings of the 2012 IEEE INFOCOM;2012:1170\u20101178; IEEE.","DOI":"10.1109\/INFCOM.2012.6195476"},{"key":"e_1_2_10_21_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732219.2732224"},{"key":"e_1_2_10_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2309133"},{"key":"e_1_2_10_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2922177"},{"key":"e_1_2_10_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.11.018"},{"issue":"11","key":"e_1_2_10_25_1","first-page":"1","article-title":"Design flaws of \"an anonymous two\u2010factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography\"","volume":"76","author":"Kumari S","year":"2016","journal-title":"Multimed Tools Appl"},{"key":"e_1_2_10_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905731"},{"key":"e_1_2_10_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-009-0166-x"},{"key":"e_1_2_10_28_1","doi-asserted-by":"crossref","unstructured":"LiuJ ZhangH XiongL LiH LuoJ. Finding probabilistic k\u2010skyline sets on uncertain data. Paper presented at: Proceedings of the 24th ACM International on Conference on Information and Knowledge Management;2015:1511\u20101520.","DOI":"10.1145\/2806416.2806452"},{"key":"e_1_2_10_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.1051"},{"key":"e_1_2_10_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.05.054"},{"key":"e_1_2_10_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.06.012"},{"key":"e_1_2_10_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2615020"},{"key":"e_1_2_10_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2330298"},{"key":"e_1_2_10_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2897133"},{"key":"e_1_2_10_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2953033"},{"key":"e_1_2_10_36_1","doi-asserted-by":"crossref","unstructured":"LiuJ YangJ XiongL PeiJ. Secure skyline queries on cloud platform. Paper presented at: Proceedings of the 2017 IEEE 33rd International Conference on Data Engineering (ICDE);2017:633\u2010644; IEEE.","DOI":"10.1109\/ICDE.2017.117"},{"key":"e_1_2_10_37_1","doi-asserted-by":"crossref","unstructured":"YangY PapadopoulosS PapadiasD KolliosG. Spatial outsourcing for location\u2010based services. Paper presented at: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering;2008:1082\u20101091.","DOI":"10.1109\/ICDE.2008.4497517"},{"key":"e_1_2_10_38_1","doi-asserted-by":"crossref","unstructured":"LinX XuJ HuH. Authentication of locationbased skyline queries. Paper presented at: Proceedings of the 20th ACM International Conference on Information and Knowledge Management;2011:1583\u20101588; ACM.","DOI":"10.1145\/2063576.2063805"},{"key":"e_1_2_10_39_1","doi-asserted-by":"crossref","unstructured":"LinX XuJ GuJ. Continuous skyline queries with integrity assurance in outsourced spatial databases. Paper presented at: Proceedings of the International Conference on Web\u2010Age Information Management;2012:114\u2010126; Springer.","DOI":"10.1007\/978-3-642-32281-5_12"},{"key":"e_1_2_10_40_1","doi-asserted-by":"crossref","unstructured":"LoH GhinitaG. Authenticating spatial skyline queries with low communication overhead. Paper presented at: Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy;2013:177\u2010180; ACM.","DOI":"10.1145\/2435349.2435374"},{"key":"e_1_2_10_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.137"},{"key":"e_1_2_10_42_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536274.2536310"},{"key":"e_1_2_10_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2857471"},{"key":"e_1_2_10_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2954156"},{"key":"e_1_2_10_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2834156"},{"key":"e_1_2_10_46_1","doi-asserted-by":"crossref","unstructured":"ZhuX WuJ ChangW WangG LiuQ. Authentication of skyline query over road networks. Paper presented at: Proceedings of the International Conference on Security Privacy and Anonymity in Computation Communication and Storage;2018:72\u201083; Springer.","DOI":"10.1007\/978-3-030-05345-1_6"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fcpe.5747","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.5747","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/cpe.5747","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.5747","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T09:26:05Z","timestamp":1692869165000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.5747"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,26]]},"references-count":45,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2022,6,25]]}},"alternative-id":["10.1002\/cpe.5747"],"URL":"https:\/\/doi.org\/10.1002\/cpe.5747","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"type":"print","value":"1532-0626"},{"type":"electronic","value":"1532-0634"}],"subject":[],"published":{"date-parts":[[2020,3,26]]},"assertion":[{"value":"2019-08-27","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-02-22","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-03-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e5747"}}