Back to Search
Start Over
Privacy-preserving trajectory similarity computation method
- Source :
- Tongxin xuebao, Vol 43, Pp 1-13 (2022)
- Publication Year :
- 2022
- Publisher :
- Editorial Department of Journal on Communications, 2022.
-
Abstract
- To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted trajectories from owners, wait for encrypted interested trajectories from requesters, and compute trajectory similarity between an interested trajectory and stored trajectories in ciphertext domain without learning anything about users’ trajectories.To compute a trajectory similarity over encrypted trajectories efficiently, a secure trajectory similarity computation protocol with longest common subsequence was proposed, which used somewhat homomorphic encryption and secure comparison protocol to compute the length of longest common subsequence over two encrypted trajectories.Furthermore, a ciphertext compression algorithm was designed to improve efficiency.Theoretical analysis and experimental evaluations show that pTSC method is secure and efficient.
Details
- Language :
- Chinese
- ISSN :
- 1000436X
- Volume :
- 43
- Database :
- Directory of Open Access Journals
- Journal :
- Tongxin xuebao
- Publication Type :
- Academic Journal
- Accession number :
- edsdoj.bca653ac7d6405ea15d16eefb21adf3
- Document Type :
- article
- Full Text :
- https://doi.org/10.11959/j.issn.1000-436x.2022223