Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

2010 5th International Symposium on Telecommunications (IST'2010)

Location Privacy in Processing Location


Dependent Queries in Mobile Database
Systems

Mehrnoosh Tarafdar 978-1-4244-8185-9/101$26.00 ©2010 IEEE 181

Department of Computer Engineering


Iran University of Science and Technology, lUST
Tehran, Iran
tarafdar@comp.iust.ac.ir

A bstract Emergence of the mobile computing paradigm helps


-

people to work in a much more convenient and efficient way,


anywhere and anytime. Today its application areas such as traffic
reports, weather forecast, bill paying and healthcare are so
popular. The field of data management is also extended with
such new services and applications. A mobile database system is
a special heterogonous distributed system that supports mobile
computing. One of the most important types of queries in mobile
environments is location dependant query. Its answer is
dependent to the mobile user's location. However, revealing
location information raises privacy concerns. This paper
concentrates on query processing in this paradigm.

Keywords-mobile computing; mobile database; query


processing; location dependent query; location privacy

I. INTRODUCTION

Today, mobile devices are inseparable part of everyday life.


Two main reasons provide this evolution. One of them is
wireless communication technology and the other is invention
of powerful, easy-to-use and portable computers (e.g. cell
phones, laptops) [1, 2]. Everyday these devices are becoming
cheaper, more powerful, smaller, storing more information,
and innovative technologies are integrated into them to
support new functionalities and services.
Appearance of these advances in the early 1990s, has led to
emergence of a new paradigm, called Mobile Computing [1, 3].
In recent years we have witnessed widening in area coverage
and an extensive use of wireless communication, such as
Bluetooth, Wi-fi, and GPRS [4, 5]. This situation helped
people to work in a much more convenient and efficient way,
anywhere and anytime [6]. Satyanarayanan in 1993 forecasted
this situation: "Mobility will influence the evolution of
distributed systems in ways that we can only dimly perceive at
the present time" [7].
Mobile computing is a specialized class of distributed
systems. In mobile computing environments, some clients are
"mobile" i.e. move freely in the physical space and reconnect
to a possibly different segment of a computer network at a later
stage and can resume suspended activities [8]. This type of
mobility is called hardware mobility in the mobile computing
framework which "...no longer requires users to maintain a
fixed and universally known position in the network and
enables unrestricted mobility of the users" [2].
Mostafa S. Haghjoo
Department of Computer Engineering
Iran University of Science and Technology, lUST
Tehran, Iran
haghjoom@iust.ac.ir

Mobile computing systems have some properties, which are


different from conventional distributed systems. Some of these are
related to characteristics of mobile devices such as energy
restriction (low power of batteries), limited capabilities of them,
and frequent disconnection [9]. The next issue is wireless
communication limitations which include low-bandwidth, less
reliability, higher probability of failure (loss, damage), latency and
asymmetry in the communications (client-server vs. server-client)
[2, 10]. There are some other properties that are due to mobility of
the users (devices) such as varying resources and changing users'
locations [11].
Mobile database system is a special heterogonous
multidatabase system that supports mobile computing. To sum up,
the contributions of this paper are:

We provide a comprehensive study of mobile database
systems, their characteristics, and architecture.

We introduce mobile database query processing.

We investigate location privacy protection in mobile
database query processing.
The paper continues as follows: In section II mobile database
systems and its characteristics and architecture are introduced.
Section III investigates query processing. Section IV discusses
about location privacy in mobile database query processing.
Related works come in section V and section VI concludes the
paper.

II. MOBILE DATABASE SYSTEMS

As the number of mobile applications increases rapidly, there


has been a growing demand for engineering database architectures
that are suitable for such dynamic environments [10, 12]. However,
existing DBMS and distributed systems lack the mechanisms for
this especial environment and many of protocols must be adapted
due to its properties [13].
A mobile database is a kind of distributed database that
supports mobile computing [10]. Besides full database
functionalities, it allows a mobile user to initiate transactions from
anywhere and at anytime. A mobile database system is a special
heterogonous multidatabase system based on PCS or GSM [1, 14].
The system is heterogeneous since it may include
different types of hardware and different data types [8]. In this system
mobile units are autonomous and may host a part o t?e �
data and their own database and DBMS. Some famIlIar
applications of mobile database are emergency services (police,
Wireless links

Wired links

• Mobile hosts

f
Fixed hosts
« ,)

Base station

/--,
\ I Wireless cell

Database
server

Database

Figure 1. Mobile database architecture.

medical, etc.), traffic control, e-commerce, and systems based


Different classes of mobile applications can be
on location-dependent information.
distinguished depending on the data management requirements
A. Mobile Database Architecture they introduce [15]. In many of the existing works, mobile
database systems refer to DBMS client-server systems in which
Fig. 1 shows a typical architecture of mobile database
systems which consists of fixed and mobile components. Fixed the client is mobile and the server is static [16]. Sistla and
others [17] proposed a centralized and distributed mobile
network (FN) is a conventional wired network which
database architecture where some data is present at the central
interconnects some other stationary parts [1, 2].
server and other data is present at mobile nodes [18].
A Mobile unit (MU) or Mobile host (MH) is a mobile
There are some extended client-server models, such as a
computer which is capable of connecting to the fixed network
three-tier client-agent-server architecture which introduces an
via a wireless link. This connection is realized by some
agent, located on the fixed network (e.g. on BSs [19]). Agents
transceivers which are equipped with a wireless interface to
communicate with MUs. They are called Base stations (BS) or are used in a variety of roles acting as a proxy of one or several
mobile hosts or being attached to a specific service or
Mobile support stations (MSS) [1]. In GSM architecture, a BS
application [20]. It is a very appropriate solution for frequent
is referred to as BTS (Base Transceiver Station) [14]. Each BS
disconnection problem.
serves MUs which are located within its radio coverage area
Besides the client-server architecture, there are other
called a cell. The size of the cell depends on the power of the
choices such as Mobile Ad-hoc Network (MANET) in which
base station [2, 14]. The wireless interface in the BSs can be
all clients are moving and the wireless network topology is
provided by different technologies such as cellular network,
changing frequently. There are no fixed infrastructures or fixed
satellites, or wireless LAN. Each of them offers a different
BSs (servers). Some research efforts attempting to handle
bandwidth capacity which is, however, too small as compared
database issues in MANET have slowly emerged [10, 16].
to the fixed network [6, 11]. A BS functions under the
Another architecture is P2P (Peer-to-Peer), in which peers
supervision of a telecommunication switch called Mobile
communicate with each other via short range wireless protocols
Switching Center (MSC). Large systems may have two or more
and without going through a central node [16]. In contrast to
MSCs and they are connected to one or many BSs through
the assumptions in MANET, a peer may not know the
wired line [14].
identities of other peers in the network and the data they store
A Fixed host (FH) is a computer in the fixed network
[21].
which is not fitted with transceiver [14]; therefore MUs can not
connect them directly. MUs can communicate with them by B. Mobile Database Characteristics
means of BSs.
Mobile database systems are commonly regarded as an
To incorporate full database functionality, it is necessary to
extension of distributed database systems. However, there are
devise a set of Database servers (DBSs) to the architecture
several characteristics that uniquely constrain solutions to
[14]. As shown in Fig. 1, each DBS can be reached by any BS
mobile problem. Some of them are due to the constraints of
or FH directly. But MUs communicates with a DBS only
mobile environments, such as power restriction and frequent
through BSs. To coordinate with database servers, some
disconnection (lead to longer transaction models and need for
additional simple data processing capability is incorporated in
relaxation of ACID properties). Mobility also introduces
BSs.
fundamental problems such as location management of mobile
A transaction may fragments into a number of sub-
objects and scalability. The scale of the network has an
transactions, which are then executed at multiple nodes. The
important impact on sharing information solutions [22].
entire execution requires a software module called a
Interoperability and standardization (in large scale) are other
coordinator, which manages the set of activities leading to the
major features [13].
termination of the transaction. A BS is a suitable node for
being a coordinator [14].

182
A. Query Processing Architecture
Mobile As a query processing point of view, there are three layers
User in a mobile database system: the application layer, the
middleware layer and the database layer (Fig. 2) [10]. The

Application
application layer accepts user queries. The middleware layer is
Layer the core of the mobile database system. Queries are processed
by the middleware and transmitted to the middleware of other
MHs in the network. The middleware of a MH sends queries to
the local database system for execution. After the database
fInishes executing a query, the results are transmitted to the
Middleware
application layer and then returned to the user. The
Layer middleware layer which is transparent to users is divided into
three sub-layers: the query layer, the cache layer and the
network layer.
The query layer parses the syntax of user queries and
determines the query types. If it is a local query, the answer is
Database produced using local database. If not, fIrst it searches the local
Layer
cache. If the entire result is found, the query ends. Otherwise, it
Figure 2. Architecture of query processing in a mobile database system searches the results from remote nodes. For join queries, the
(adapted from [10]). query layer evaluates the query cost and generates some
distributed query plans. In such situations, the network layer is
responsible for the communications in the system. The cache
III. QUERY PROCESSING IN MOBILE DATABASE SYSTEMS
layer stores data accessed frequently by non-local queries. This
Special characteristics of mobile computing and mobile decreases the query response time and improves the data
database systems differentiate mobile query processing from accessibility when node disconnection occurs [10].
traditional distributed one. The query processing in a mobile
environment involves join processing among different sites IV. LOCATION PRIVACY

which include static and mobile stations [23]. In many cases, Mobile database system is a suitable platform for providing
performing several joins across the relations residing in Location based services (LBS). Privacy protection is an
multiple mobile units, leads to complex situations [24]. important issue in this context. Revealing location information
In conventional distributed database systems, the site at raises privacy concerns. Moreover, as a user becomes more
which a query is issued is also the site to which the result is dependent on such systems, they become more knowledgeable
sent. However, in a mobile system these two sites are often about herlhis movements and habits. This information can be
different due to the user's mobility. The longer the query takes put to a variety of unpleasant uses such as targeted spams [28].
to be processed, the more likely the MU moves to a new Broadcasting is a very appropriate way for mobile users in this
location [25]. Also approximate answers are more acceptable context; because they do not need to issue queries or
in mobile databases than in traditional databases due to the communicate their locations [11]. But this strategy is not
frequent disconnection and long-time transaction executions proper for many cases. Recent research efforts have been
[26]. Traditional query processing techniques based on global dedicated to deal with this challenge. Existing solutions can be
data schema and collected statistics are no more adequate [8]. divided into two general approaches:
In general, two types of queries can be distinguished in a
mobile environment: Non-Location Related queries (NLRQ) A. Utilizing a Trusted Third Party
and Location Related queries (LRQ). In fact, a NLRQ is a In this approach, a trusted third party (usually called
traditional query whose answer does not depend on locations location anonymizer) is located between the users and the
and none of the predicates and attributes used in it are location service provider. All users subscribe to it and specify their own
related [27]. Example: "Retrieve the names of the servants of a desired level of privacy through a user-specifIed privacy
Hotel". Contrary to NLRQs, LRQs have at least one location profIle. Users send their queries to servers via anonymizer [29,
related predicate or attribute. 30]. Its main function is to blur a user's exact location using
There are two categories of LRQs. The fIrst one is Location either spatial or temporal cloaking [31].
Aware queries (LAQ) which has an explicit indication of This is usually achieved by a technique which is called k-
location. For example: "Select the names of hotels in Tehran". anonymity [32]. In this model, the exact location of the user is
The second one is Location Dependant queries (LDQ). The cloaked into an area that contains at least k users. Fig. 3
location value in these queries is not explicitly known when the illustrates this technique.
query is asked. Their answers are dependent to MU's location; This approach has several drawbacks. For example the
i.e. the mobility affects their processing. For example, "Find anonymizer becomes a bottleneck and also it is a single point
the hotels within 5 km of here" or "Find me the nearest hotel". of attack [29, 33]
In order to provide the answer to the query, fIrst we have to
know the location of the query issuer. When we fInd out the B. No Trusted Third Party
issuer's location (Location Binding), the query becomes Users manage their own privacy by some tricks such as: (a)
location-aware [27]. False dummies [34]. For each location based query, the user

183
towards context-aware data management, sensor networks,
continuous queries and web-based services [13].
There are some commercial products proposing database
solutions for mobile environments [20]. Some of them are:
FastObjects (Versant Co., object-oriented DB, Java platform,
ACID nested and parallel transactions, single offline
application, [38]); Oracle Database Lite (Oracle Corporation,
relational DB, ACID transactions, offline applications, [39]);
Anonymizer
DB2 Everyplace (IBM, relational DB, flat transactions, offline
1,2= Query (MyLocation= Point P) Protocol: applications, [40]); WebSphere Everyplace Access (IBM,
3= Query (MyLocation= Area A) K-Anonymity online web application access, [41]); PointBase (DataMirror
K=4
4,5,6= Result Co., relational DB, Java platform, flat transactions in micro

Figure 3. Location privacy with k-anonymity. version, distributed transactions in the embedded version,
single offline application, [42]).
sends n different locations to the server which only one of them B. Query Processing in Mobile Database Systems
is true and the rest are dummies. The server sends an answer
Several research efforts have been dedicated to query
set for all of them and can not distinguish the real one. (b)
processing issues in mobile databases. The paper [26]
False location (Landmark objects) [35]. Sending the location
introduces query optimization and transaction models related
of a nearby certain landmark or a significant object instead of
to mobile database systems. [43] combines the problem of
the exact location.
location management and query processing. It discusses
several strategies for efficient processing of queries to obtain
The first approach needs a trusted third party which users
the location or activeness of an MU. the authors in [24]
really trust it and also subscribe to it. Moreover, becoming a
proposed several query processing schemes that are able to
bottleneck and also a single point of attack are disadvantages of
divide the query processing into several sub-query processing
this approach. The second one is very easy but increases
modules, appropriate to the network topology. In [23] and [4],
processing overhead in mobile units. In false location
various challenging issues in querying in a mobile distributed
technique, mobile users should have information about nearby
environment are presented. Papers such as [6, 23] discussed
certain landmarks or a comprehensive map. In some situations
about query processing strategies.
it may be unavailable.
Many researches are about location dependent queries. One
V. RELATED WORK of the most noticeable surveys in this subject is [11]. However
investigation about this subject started in 90's. [44] presented
A. Mobile Databases the concept of queries with location constraints. Location-
aware query processing technique has been studied in [45].
In recent years, there has been a remarkable surge of
Some of research efforts studied processing a specific type of
research in the area of data management in mobile computing.
query and introducing new methods and improving the
Work on mobile databases started in the early 90's [16]. The
performance such as [46].
topic of mobile database systems was introduced by Imielinski
and Badrinath in 1993 in [36] and also [37]. They categorize C. Privacy Protection in Location Based Services
research into the areas of mobility (e.g. locating users),
Recently some research efforts have been dedicated to deal
disconnection (e.g. handoff effect on transaction processing),
with getting anonymous services from location-based
new data access modes (e.g. wireless medium or power), and
applications such as [30, 31, 34]. Most existing approaches for
scale. Alonso and Korth [26] concentrate on the impact that
private location-dependent queries follow the anonymizer
mobile computing has on various database processing activities
approach. Location cloaking is one typical approach to
such as optimization, transaction models, and security.
protecting user location privacy in LBS [30, 31]. The paper
In 1995, Dunham and Helal [1] argued that data
[47] combines spatial with temporal cloaking. In [30], the
management in mobile computing environments is similar to
anonymizer maintains the locations of the clients using a
that of a distributed system and presented open challenges in
pyramid data structure, similar to a Quad-tree. [48] uses a P2P
mobile database systems. Sistla and others in [17] proposed a
system to support distributed anonymization; although a
mobile database architecture.
centralized anonymizer is not required, all users must trust each
One of the most noticeable mobile database surveys was in
other.
1999 by Barbar'a [2]. This paper surveys each distinctive
feature of mobile computing and how they impact the VI. CONCLUSIONS AND FURTHER WORK
implementation of databases for mobile computers. Barbar'a
Today, mobile devices are inseparable part of everyday life.
indicates several open research areas in mobile database
Emergence of the mobile computing paradigm helped people to
systems: prototyping, effective bandwidth utilization,
work in a much more convenient and efficient way, anywhere
transactional properties, optimization of location dependent
and anytime. The field of data management is also extended
query processing, and data visualization.
with such new services and applications. Mobile database
At the turn of the century the focus of mobile data
system is a special heterogonous multidatabase system that
management research has shifted from human interaction and
supports mobile computing. In this paper, we presented some
distributed activities in mobile computing environments

184
preliminaries on mobile computing and mobile database
[16] L. Gruenwald and F. Olken, "Mobile database research: What is to be
system and its architecture. done?," Proc. of the 1st Workshop on Research Directions in
There are several demands and challenges in mobile Situational-Aware Self-managed Proactive Computing in Wireless
database query processing that should be considered. One of Adhoc Networks,2009.
the most important types of queries in mobile environments is [17] P. Sistla, O. Wolfson, S. Chamberlain, and S. Dao, "Modeling and
location dependant query. Its answer is dependent to the querying moving objects," Proc. of the 13th Int. Conf. on Data
Engineering (ICDE 97),IEEE Press,1997,pp. 422-432.
mobile user's location. However, revealing location information
[18] R. Malladi and K. C. Davis, "Applying multiple query optimization in
raises privacy concerns. There are some techniques to deal with
mobile databases," Proc. of the 36th Annual Hawaii Int. Conf. on System
this challenge. One approach is that each mobile unit handles Sciences (HICSS 03),vol. 9,IEEE Press,2003,pp. 294.2.
this problem itself by some available tricks. Another approach
[19] X. Gao and A. R. Hurson, "Location dependent query proxy," Proc. of
is to use a trusted third party. One of the most noticeable the ACM Symp. on Applied Computing (SAC 05), 2005, pp. 1120-
techniques in this context is k-anonymity. Each of these 1124.
approaches has advantages and disadvantages. Privacy [20] P. S. Alvarado, C. Ronancio, and M. Adiba, "A survey of mobile
concerns in processing location dependant queries are still transaction," Distributed and Parallel Databases, vol. 16, pp. 193-230,
open area of research; due to lack of efficient algorithms. 2004.
Comparing the efficiency of different approaches via simulation [21] Y. Luo and O. Wolfson, "Mobile P2P databases," in Encyclopedia of
GIS,S. Shekhar and H. Xiong,Eds. Springer,2008,pp. 671-677.
models can be very helpful.
[22] A. Bouguettaya, "On the construction of mobile database management
systems," Proc. of the 1st Australian Workshop on Mobile Computing &
REFERENCES
Databases & Applications (MCDA 96),1996.
[1] M. H. Dunham and A. Helal, "Mobile computing and databases: [23] W. C. Peng and M. S. Chen, "Query processing in a mobile computing
anything new?," SIGMOD Record,vol. 24,no. 4,pp. 5-9,1995.
environment: Exploiting the features of asymmetry," IEEE Trans. on
[2] D. Barbara, "Mobile computing and databases - a survey," IEEE Trans. Knowledge and Data Engineering,vol. 17,no. 7,pp. 982-996, 2005.
on Knowledge and Data Engineering,vol. 11,no. I, pp. 108-117,1999. [24] C. H. Lee and M. S. Chen, "Using remote joins for the processing of
[3] G. H. Forman and J. Zahorjan, "The challenges of mobile computing," distributed mobile queries," Proc. of the 7th Int. Conf. Database Systems
IEEE Computer,vol. 27,no. 4,pp. 38-47,1994. for Advanced Applications (DASFAA 01), IEEE Press, 2001, pp. 226-
[4] N. Marsit, A. Hameurlain, Z. Mammeri, and F. Morvan, "Query 233.
processing in mobile environments: A survey and open problems," Proc. [25] C. Lee and C. H. Ke, "A prediction-based query processing strategy in
of the 1st Int. Conf. on Distributed Frameworks for Multimedia mobile commerce systems," Database Management, vol. 12, no. 3, pp.
Applications (DFMA 05),IEEE Press,2005,pp. 150-157. 14-26,2001.
[5] F. Pinelli, A. Monreale, R. Trasarti, and F. Giannotti, "Location [26] R. Alonso and H. F. Korth, "Database system issues in nomadic
prediction within the mobility data analysis environment DAEDALUS," computing," Proc. of ACM SIGMOD Int. Conf. on Management of
Proc. of the 5th Int. Conf. on Mobile and Ubiquitous Systems: Data,1993,pp. 388-392.
Computing, Networking, and Services (MobiQuitous 08), ICST Press,
[27] A. Y. Seydim, M. H. Dunham, and V. Kumar, "Location dependent
2008.
query processing," Proc. of the 2nd ACM Int. Workshop on Data
[6] A. B. Waluyo, B. Srinivasan, and D. Taniar, "Mobile query and Engineering for Wireless and Mobile Access (MobiDE 01),ACM Press,
processing in mobile database environment," Proc. of the 1st Int. Conf. 2001,pp. 47-53.
on Advances in Mobile Multimedia (MoMM 03), vol. 171, Austrian
[28] M. Satyanarayanan, "Pervasive computing: Vision and challenges,"
Computer Society Press,2003,pp. 55-64. IEEE Personal Communications,vol. 8,no. 4,pp. 10-17,2001.
[7] M. Satyanarayanan, "Mobile computing," Computer, vol. 26, no. 9, [29] G. Ghinita, P. Kalnis, and S. Skiadopoulos, "MobiHide: A Mobilea
pp. 81-82,1993. peer-to-peer system for anonymous location-based queries," Proc. of the
[8] H. Grine, T. Delot, and S. Lecomte, "Adaptive query processing in lOth Int. Symp. on Advances in Spatial and Temporal Databases (SSTD
mobile environment," Proc. of the 3cd Int. Workshop on Middleware for 07),2007,pp. 221-238.
Pervasive and Ad-hoc Computing (MPAC 05), vol. 115, ACM Press,
[30] C. Y. Chow and W. G. Aref, "Casper*: Query processing for location
2005,pp. 1-8.
services without compromising privacy," ACM Trans. on Database
[9] Y. D. Chung,"A cache invalidation scheme for continuous partial match Systems (TODS),vol. 34,no. 4,2009.
queries in mobile computing environments," Distributed and Parallel
[31] M. Gruteser and D. Grunwald, "Anonymous usage of location-based
Databases,vol. 23,no. 3,pp. 207-234,2008.
services through spatial and temporal cloaking," Proc. of the Int.
[10] J. Li,Y. Li,M. T. Thai,and J. Li,"Data caching and query processing in Conf. on Mobile Systems, Applications, and Services (MobiSys 03),
MANETs," Pervasive Computing and Communications, vol. 1, no. 3, ACM Press,2003,pp. 31-42.
pp. 169-178,2005.
[32] L. Sweene, "k-Anonymity: A model for protecting privacy,"
[11] S. lIar, E. Mena, and A. Illarramendi, "Location-dependent query Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5,
processing: Where we are and where we are heading," ACM Computing pp. 557-570,2002.
Surveys,vol. 42,no. 3,pp. 1-73,2010.
[33] G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K. L. Tan,
[12] H. Artail, M. Shihab, and H. Safa, "A distributed mobile database "Private queries in location based services: Anonymizers are not
implementation on pocket PC mobile devices communicating over necessary," Proc. of the ACM SIGMOD Int. Conf. on Management
Bluetooth," Network and Computer Applications, vol. 32, pp. 96-115, of Data,2008,pp. 121-132.
2009.
[34] H. Kido, Y. Yanagisawa,and T. Satoh,"An anonymous communication
[13] A. Zaslavsky, P. K. Chrysanthis, and V. Kumar,"Mobility in databases technique using dummies for location-based services," Proc. of IEEE
and distributed systems: Summing up achievements of the past decade," Int. Conf. on Pervasive Services (ICPS 05),2005,pp. 88-97.
Mobile Networks and Applications,vol. 9,no. 5,pp. 455-457,2004.
[35] J. I. Hong and J. A. Landay, "An architecture for privacy-sensitive
[14] V. Kumar, Mobile Database Systems, NJ: John Wiley & Sons INC., ubiquitous computing," Proc. of the 2nd Int. Conf. on Mobile Systems,
2006. Applications, and Services (MobiSys 04), ACM Press, 2004, pp. 177-
[15] G. Bernard et al., "Mobile databases: a selection of open issues and 189.
research directions," ACM SIGMOD Record, vol. 33, no. 2, pp. 78-83, [36] T. Imielinski and B. R. Badrinath, "Data management for mobile
2004. computing," SIGMOD Record,vol. 22,no. I, pp. 34-39,1993.

185
[37] T. Imielinski and B. R. Badrinath, "Mobile wireless computing:
[44] T. Imielinski and B. R. Badrinath, "Querying in highly mobile
Challenges in data management," Communications of the ACM,vol.
distributed environments," Proc. of the 18th Int. Conf. on Very Large
37, no. 10,pp. 18-28,1994.
Data Bases (VLDB 92),1992,pp. 41-52.
[38] Versant Corporation, FastObjects, www.fastobjects.com. (Accessed in
[45] H. E. Kottkamp and O. Zukunft, "Location-aware query processing in
May 2010).
mobile database systems," Proc. of the ACM Symp. on Applied
[39] Oracle Corporation, Oracle Database Lite, Computing (SAC 98),1998,pp. 41�23.
www.oracle.comltechnology/products/lite/index.html. (Accessed in May
[46] Y. Iijima and Y. Ishikawa, "Finding probabilistic nearest neighbors for
2010).
query objects with imprecise locations," Proc. of the 10th Int. Conf.
[40] IBM Software Products, DB2 Everyplace, on
www-01.ibm.comlsoftware/dataldb2/everyplace, (Accessed in May Mobile Data Management: Systems, Services and Middleware (MDM
2010). 09),IEEE Press,2009,pp. 52-61.
[41] IBM Software Products, WebSphere Everyplace Access, www- [47] B. Gedik and L. Liu, "Location privacy in mobile systems: A
Ol.ibm.comlsoftware/pervasive/ws_everyplace_access, (Accessed in personalized anonymization model," Proc. of the 25 th IEEE Int. Conf. on
May 2010). Distributed Computing Systems (ICDCS 05),2005,pp. 620-629.
[42] PointBase Java Databases, www.pointbase.com. (Accessed in May [48] G. Ghinita, P. Kalnis, and S. Skiadopoulos, "PRIVE: Anonymous
2010). location-based queries in distributed mobile systems," Proc. of the 16th
[43] M. Tsukamoto, R. Kadobayashi, and S. Nishio, "Strategies for query Int. Conf. on World Wide Web (WWW 07),ACM Press,2007,pp. 371-
processing in mobile computing," in Mobile Computing, T. Imielinski 380.
and H. F. Korth,Eds. Kluwer Academic,1996,pp. 595-620.

186

You might also like