Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Qian Chen is active.

Publication


Featured researches published by Qian Chen.


international conference on management of data | 2012

Authenticating location-based services without compromising location privacy

Haibo Hu; Jianliang Xu; Qian Chen; Ziwei Yang

The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based forms. To address the trust issue, the service providers are expected to deliver their location-based services in an authenticatable manner, so that the correctness of the service results can be verified by the client. However, existing works on query authentication cannot preserve the privacy of the data being queried, which are sensitive user locations when it comes to location-based services and mSNSs. In this paper, we address this challenging problem by proposing a comprehensive solution that preserves unconditional location privacy when authenticating range queries. Three authentication schemes for


very large data bases | 2013

Authenticating top-k queries in location-based services with confidentiality

Qian Chen; Haibo Hu; Jianliang Xu

R


international conference on data engineering | 2013

VERDICT: Privacy-preserving authentication of range queries in location-based services

Haibo Hu; Qian Chen; Jianliang Xu

-tree and grid-file index, together with two optimization techniques, are developed. Cost models, security analysis, and experimental results consistently show the effectiveness, reliability and robustness of the proposed schemes under various system settings and query workloads.


IEEE Transactions on Knowledge and Data Engineering | 2015

Structure-Preserving Subgraph Query Services

Zhe Fan; Byron Choi; Qian Chen; Jianliang Xu; Haibo Hu; Sourav S. Bhowmick

State-of-the-art location-based services (LBSs) involve data owners, requesting clients, and service providers. As LBSs become new business opportunities, there is an increasing necessity to verify the genuineness of service results. Unfortunately, while traditional query authentication techniques can address this issue, they fail to protect the confidentiality of data, which is sensitive location information when LBSs are concerned. Recent work has studied how to preserve such location privacy in query authentication. However, the prior work is limited to range queries, where private values only appear on one side of the range comparison. In this paper, we address the more challenging authentication problem on top-k queries, where private values appear on both sides of a comparison. To start with, we propose two novel cryptographic building blocks, followed by a comprehensive design of authentication schemes for top-k queries based on R-tree and Power Diagram indexes. Optimizations, security analysis, and experimental results consistently show the effectiveness and robustness of the proposed schemes under various system settings and query workloads.


international conference on management of data | 2015

Authenticated Online Data Integration Services

Qian Chen; Haibo Hu; Jianliang Xu

We demonstrate VERDICT, a location-based range query service featuring the privacy-preserving authentication capability. VERDICT adopts the common data-as-a-service (DaaS) model, which consists of the data owner (a location registry or a mobile operator) who provides the querying data, the service provider who executes the query, and the querying users. The system features a privacy-preserving query authentication module that enables the user to verify the correctness of results while still protecting the data privacy. This feature is crucial in many location-based services where the querying data are user locations. To achieve this, VERDICT employs an MR-tree based privacy-preserving authentication scheme proposed in our earlier work [3]. The use case study shows that VERDICT provides efficient and smooth user experience for authenticating location-based range queries.


IEEE Transactions on Knowledge and Data Engineering | 2018

Authenticating Aggregate Queries over Set-Valued Data with Confidentiality

Cheng Xu; Qian Chen; Haibo Hu; Jianliang Xu; Xiaojun Hei

A fundamental problem of graph databases is subgraph isomorphism query (a.k.a subgraph query): given a query graph


IEEE Transactions on Mobile Computing | 2017

Assuring Spatio-Temporal Integrity on Mobile Devices with Minimum Location Disclosure

Haibo Hu; Qian Chen; Jianliang Xu; Byron Choi

Q


international conference on data engineering | 2016

Structure-preserving subgraph query services

Zhe Fan; Byron Choi; Qian Chen; Jianliang Xu; Haibo Hu; Sourav S. Bhowmick

and a graph database, it retrieves the graphs


Archive | 2013

Method and apparatus for authenticating location-based services without compromising location privacy

Haibo Hu; Jianliang Xu; Qian Chen

G


international conference on data engineering | 2018

Authenticating Aggregate Queries over Set-Valued Data with Confidentiality (Extended Abstract)

Cheng Xu; Qian Chen; Haibo Hu; Jianliang Xu; Xiaojun Hei

s from the database that contain

Collaboration


Dive into the Qian Chen's collaboration.

Top Co-Authors

Avatar

Haibo Hu

Hong Kong Baptist University

View shared research outputs
Top Co-Authors

Avatar

Jianliang Xu

Hong Kong Baptist University

View shared research outputs
Top Co-Authors

Avatar

Byron Choi

Hong Kong Baptist University

View shared research outputs
Top Co-Authors

Avatar

Cheng Xu

Hong Kong Baptist University

View shared research outputs
Top Co-Authors

Avatar

Zhe Fan

Hong Kong Baptist University

View shared research outputs
Top Co-Authors

Avatar

Xiaojun Hei

Huazhong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Sourav S. Bhowmick

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar

Ziwei Yang

Hong Kong Baptist University

View shared research outputs
Researchain Logo
Decentralizing Knowledge