Mi-Young Jang

Learn More
In Location-Based Services (LBSs), users send location-based queries to LBS servers along with their exact locations, but the location information of the users can be misused by adversaries. In this regard, there must be a mechanism which can deal with the privacy protection of the users. In this paper, we propose a cloaking method considering both(More)
Recently, cloud computing has been spotlighted as a new paradigm of database management system. In this environment, databases are outsourced and deployed on a service provider in order to reduce cost for data storage and maintenance. However, the service provider might be untrusted so that the two issues of data security, including data confidentiality and(More)
Wireless sensor networks (WSNs) have been broadly studied with advances in ubiquitous computing environment. Because the resource of a sensor node is limited, it is important to use energy-efficient routing protocol in WSNs. The cluster-based routing is an efficient way to reduce energy consumption by decreasing the number of transmitted messages to the(More)
With the development of cloud computing, the interest on spatial database outsourcing has been increasing. Therefore, researches for protecting location data privacy in spatial outsourced databases have been actively performed. However, FDH (Flexible Distance-Based Hashing) is easy to access original data because they do not consider data distribution. In(More)
Because much interest in spatial database in cloud computing has been attracted, studies on preserving location data privacy in cloud computing have been actively done. However, since the existing spatial transformation schemes are weak to proximity attack, they cannot preserve the privacy of users who enjoy location-based services from the cloud computing.(More)
Due to the advancement of wireless internet and mobile positioning technology, the application of location-based services (LBSs) has become popular for mobile users. Since users have to send their exact locations to obtain the service, it may lead to several privacy threats. To solve this problem, a cloaking method has been proposed to blur users’ exact(More)
Because MapReduce supports efficient parallel data processing, MapReduce-based query processing algorithms have been widely studied. Among various query types, k-nearest neighbor join, which aims to produce the k nearest neighbors of each point of a dataset from another dataset, has been considered most important in data analysis. Existing k-NN join query(More)
Location-Based Services (LBSs) are becoming popular due to the advances in mobile networks and positioning capabilities. When a user sends a query with his exact location to the LBS server, the server processes the query and returns Points of Interest (POIs) to the user. Providing user's exact location to the LBS server may lead revealing his private(More)