Privacy-preserving trajectory similarity computation method

To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted trajectories from owners, wait for encrypted intereste...

Full description

Saved in:
Bibliographic Details
Main Authors: Haining YU, Hongli ZHANG, Xiangzhan YU, Jiaxing QU, Mengmeng GE
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2022-11-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2022223/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539962330152960
author Haining YU
Hongli ZHANG
Xiangzhan YU
Jiaxing QU
Mengmeng GE
author_facet Haining YU
Hongli ZHANG
Xiangzhan YU
Jiaxing QU
Mengmeng GE
author_sort Haining YU
collection DOAJ
description To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted trajectories from owners, wait for encrypted interested trajectories from requesters, and compute trajectory similarity between an interested trajectory and stored trajectories in ciphertext domain without learning anything about users’ trajectories.To compute a trajectory similarity over encrypted trajectories efficiently, a secure trajectory similarity computation protocol with longest common subsequence was proposed, which used somewhat homomorphic encryption and secure comparison protocol to compute the length of longest common subsequence over two encrypted trajectories.Furthermore, a ciphertext compression algorithm was designed to improve efficiency.Theoretical analysis and experimental evaluations show that pTSC method is secure and efficient.
format Article
id doaj-art-2f851f99f1b848498e188aecc49198e6
institution Kabale University
issn 1000-436X
language zho
publishDate 2022-11-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-2f851f99f1b848498e188aecc49198e62025-01-14T06:29:16ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2022-11-014311359393424Privacy-preserving trajectory similarity computation methodHaining YUHongli ZHANGXiangzhan YUJiaxing QUMengmeng GETo tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted trajectories from owners, wait for encrypted interested trajectories from requesters, and compute trajectory similarity between an interested trajectory and stored trajectories in ciphertext domain without learning anything about users’ trajectories.To compute a trajectory similarity over encrypted trajectories efficiently, a secure trajectory similarity computation protocol with longest common subsequence was proposed, which used somewhat homomorphic encryption and secure comparison protocol to compute the length of longest common subsequence over two encrypted trajectories.Furthermore, a ciphertext compression algorithm was designed to improve efficiency.Theoretical analysis and experimental evaluations show that pTSC method is secure and efficient.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2022223/privacy-preservingtrajectory similarityhomomorphic encryptionsecure computing
spellingShingle Haining YU
Hongli ZHANG
Xiangzhan YU
Jiaxing QU
Mengmeng GE
Privacy-preserving trajectory similarity computation method
Tongxin xuebao
privacy-preserving
trajectory similarity
homomorphic encryption
secure computing
title Privacy-preserving trajectory similarity computation method
title_full Privacy-preserving trajectory similarity computation method
title_fullStr Privacy-preserving trajectory similarity computation method
title_full_unstemmed Privacy-preserving trajectory similarity computation method
title_short Privacy-preserving trajectory similarity computation method
title_sort privacy preserving trajectory similarity computation method
topic privacy-preserving
trajectory similarity
homomorphic encryption
secure computing
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2022223/
work_keys_str_mv AT hainingyu privacypreservingtrajectorysimilaritycomputationmethod
AT honglizhang privacypreservingtrajectorysimilaritycomputationmethod
AT xiangzhanyu privacypreservingtrajectorysimilaritycomputationmethod
AT jiaxingqu privacypreservingtrajectorysimilaritycomputationmethod
AT mengmengge privacypreservingtrajectorysimilaritycomputationmethod