Privacy-preserving trajectory similarity computation method
To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted trajectories from owners, wait for encrypted intereste...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2022-11-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2022223/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539962330152960 |
---|---|
author | Haining YU Hongli ZHANG Xiangzhan YU Jiaxing QU Mengmeng GE |
author_facet | Haining YU Hongli ZHANG Xiangzhan YU Jiaxing QU Mengmeng GE |
author_sort | Haining YU |
collection | DOAJ |
description | To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted trajectories from owners, wait for encrypted interested trajectories from requesters, and compute trajectory similarity between an interested trajectory and stored trajectories in ciphertext domain without learning anything about users’ trajectories.To compute a trajectory similarity over encrypted trajectories efficiently, a secure trajectory similarity computation protocol with longest common subsequence was proposed, which used somewhat homomorphic encryption and secure comparison protocol to compute the length of longest common subsequence over two encrypted trajectories.Furthermore, a ciphertext compression algorithm was designed to improve efficiency.Theoretical analysis and experimental evaluations show that pTSC method is secure and efficient. |
format | Article |
id | doaj-art-2f851f99f1b848498e188aecc49198e6 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2022-11-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-2f851f99f1b848498e188aecc49198e62025-01-14T06:29:16ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2022-11-014311359393424Privacy-preserving trajectory similarity computation methodHaining YUHongli ZHANGXiangzhan YUJiaxing QUMengmeng GETo tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted trajectories from owners, wait for encrypted interested trajectories from requesters, and compute trajectory similarity between an interested trajectory and stored trajectories in ciphertext domain without learning anything about users’ trajectories.To compute a trajectory similarity over encrypted trajectories efficiently, a secure trajectory similarity computation protocol with longest common subsequence was proposed, which used somewhat homomorphic encryption and secure comparison protocol to compute the length of longest common subsequence over two encrypted trajectories.Furthermore, a ciphertext compression algorithm was designed to improve efficiency.Theoretical analysis and experimental evaluations show that pTSC method is secure and efficient.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2022223/privacy-preservingtrajectory similarityhomomorphic encryptionsecure computing |
spellingShingle | Haining YU Hongli ZHANG Xiangzhan YU Jiaxing QU Mengmeng GE Privacy-preserving trajectory similarity computation method Tongxin xuebao privacy-preserving trajectory similarity homomorphic encryption secure computing |
title | Privacy-preserving trajectory similarity computation method |
title_full | Privacy-preserving trajectory similarity computation method |
title_fullStr | Privacy-preserving trajectory similarity computation method |
title_full_unstemmed | Privacy-preserving trajectory similarity computation method |
title_short | Privacy-preserving trajectory similarity computation method |
title_sort | privacy preserving trajectory similarity computation method |
topic | privacy-preserving trajectory similarity homomorphic encryption secure computing |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2022223/ |
work_keys_str_mv | AT hainingyu privacypreservingtrajectorysimilaritycomputationmethod AT honglizhang privacypreservingtrajectorysimilaritycomputationmethod AT xiangzhanyu privacypreservingtrajectorysimilaritycomputationmethod AT jiaxingqu privacypreservingtrajectorysimilaritycomputationmethod AT mengmengge privacypreservingtrajectorysimilaritycomputationmethod |