{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T04:19:05Z","timestamp":1761279545026,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030161835"},{"type":"electronic","value":"9783030161842"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-16184-2_85","type":"book-chapter","created":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T13:04:26Z","timestamp":1553864666000},"page":"900-910","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy Preserving kNN Spatial Query with Voronoi Neighbors"],"prefix":"10.1007","author":[{"given":"Eva","family":"Habeeb","sequence":"first","affiliation":[]},{"given":"Ibrahim","family":"Kamel","sequence":"additional","affiliation":[]},{"given":"Zaher","family":"Al Aghbari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,30]]},"reference":[{"key":"85_CR1","doi-asserted-by":"crossref","unstructured":"Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Advances in Spatial and Temporal Data Bases. Springer, pp. 239\u2013257 (2007)","DOI":"10.1007\/978-3-540-73540-3_14"},{"issue":"1","key":"85_CR2","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s10707-012-0156-9","volume":"17","author":"W-S Ku","year":"2013","unstructured":"Ku, W.-S., Hu, L., Shahabi, C., Wang, H.: A query integrity assurance scheme for accessing outsourced spatial databases. Geoinformatica 17(1), 97\u2013124 (2013)","journal-title":"Geoinformatica"},{"issue":"3","key":"85_CR3","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/s00778-009-0169-7","volume":"19","author":"ML Yiu","year":"2010","unstructured":"Yiu, M.L., Ghinita, G., Jensen, C.S., Kalnis, P.: Enabling search services on outsourced private spatial data. VLDB J. 19(3), 363\u2013384 (2010)","journal-title":"VLDB J."},{"key":"85_CR4","doi-asserted-by":"crossref","unstructured":"Kim, H.-I., Hong, S.-T., Chang, J.-W.: Hilbert-curve based cryptographic transformation scheme for protecting data privacy on outsourced private spatial data. In: 2014 International Conference on Big Data and Smart Computing (BIGCOMP), pp. 77\u201382. IEEE (2014)","DOI":"10.1109\/BIGCOMP.2014.6741411"},{"key":"85_CR5","doi-asserted-by":"crossref","unstructured":"Hacigumus, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: Proceedings of 18th International Conference on Data Engineering, 2002, pp. 29\u201338 (2002). IEEE","DOI":"10.1109\/ICDE.2002.994695"},{"key":"85_CR6","doi-asserted-by":"crossref","unstructured":"Damiani, E., Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 93\u2013102. ACM (2003)","DOI":"10.1145\/948109.948124"},{"key":"85_CR7","doi-asserted-by":"crossref","unstructured":"Hossain, A.A., Lee, S.-J., Huh, E.-N.: Shear-based spatial transformation to protect proximity attack in outsourced database. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1633\u20131638. IEEE (2013)","DOI":"10.1109\/TrustCom.2013.201"},{"key":"85_CR8","unstructured":"Real spatial datasets. http:\/\/www.cs.fsu.edu\/lifeifei\/SpatialDataset.htm"},{"key":"85_CR9","doi-asserted-by":"crossref","unstructured":"Talha, A.M., Kamel, I., Aghbari, Z.A.: Secure kNN queries over outsourced spatial data for location-based services. In: 2016 12th International Conference on Innovations in Information Technology (IIT), Al-Ain, pp. 1\u20134 (2016)","DOI":"10.1109\/INNOVATIONS.2016.7880038"},{"issue":"4","key":"85_CR10","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1109\/TKDE.2011.267","volume":"25","author":"L Hu","year":"2013","unstructured":"Hu, L., Ku, W., Bakiras, S., Shahabi, C.: Spatial query integrity with voronoi neighbors. IEEE Trans. Knowl. Data Eng. 25(4), 863\u2013876 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"85_CR11","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1016\/B978-012088469-8.50074-7","volume-title":"Proceedings 2004 VLDB Conference","author":"Mohammad Kolahdouzan","year":"2004","unstructured":"Kolahdouzan, M., Shahabi, C.: Voronoi-based k nearest neighbor search for spatial network databases. In: Proceedings of VLDB, vol. 30, pp. 840\u2013851 (2004). https:\/\/doi.org\/10.1016\/b978-012088469-8.50074-7"},{"key":"85_CR12","unstructured":"Arora, D., Kumar, U.: Implications of privacy preserving k-means clustering over outsourced data on cloud platform. J. Theor. Appl. Inf. Technol. 96(12) (2018)"},{"issue":"4","key":"85_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1620585.1620591","volume":"34","author":"Chi-Yin Chow","year":"2009","unstructured":"Chow, C.-Y., Mokbel, M.F., Aref, W.G.: Casper*: query processing for location services without compromising privacy. ACM Trans. Database Syst. (TODS) 34(4) (2009). Article24","journal-title":"ACM Transactions on Database Systems"},{"key":"85_CR14","doi-asserted-by":"crossref","unstructured":"Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: Proceedings of the International Conference on Management of Data and 28th Symposium on Principles of Database Systems (SIGMOD-PODS 2009), Providence, RI, USA, pp. 139\u2013152, July 2009","DOI":"10.1145\/1559845.1559862"},{"key":"85_CR15","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Xu, R., Takagi, T.: Secure k-NN computation on encrypted cloud data without sharing key with query users. In: Proceedings of the 2013 1st International Workshop on Security in Cloud Computing, Cloud Computing 2013, China, pp. 55\u201360, May 2013","DOI":"10.1145\/2484402.2484415"},{"key":"85_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jpdc.2015.11.004","volume":"89","author":"Y Zhu","year":"2016","unstructured":"Zhu, Y., Huang, Z., Takagi, T.: Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J. Parallel Distrib. Comput. 89, 1\u201312 (2016)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"3","key":"85_CR17","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s00778-011-0245-7","volume":"21","author":"B Hore","year":"2011","unstructured":"Hore, B., Mehrotra, S., Canim, M., Kantarcioglu, M.: Secure multidimensional range queries over outsourced data. VLDB J. 21(3), 333\u2013358 (2011)","journal-title":"VLDB J."},{"key":"85_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/8109730","volume":"2017","author":"J Hong","year":"2017","unstructured":"Hong, J., Wen, T., Guo, Q., Ye, Z.: Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud. Math. Probl. Eng. 2017, 1\u201315 (2017)","journal-title":"Math. Probl. Eng."}],"container-title":["Advances in Intelligent Systems and Computing","New Knowledge in Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-16184-2_85","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T04:13:56Z","timestamp":1761279236000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-16184-2_85"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030161835","9783030161842"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-16184-2_85","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"30 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WorldCIST'19","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"World Conference on Information Systems and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Galicia","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"worldcist2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.worldcist.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}