Back to Search Start Over

Privacy-preserving trajectory similarity computation method

Authors :
Haining YU
Hongli ZHANG
Xiangzhan YU
Jiaxing QU
Mengmeng GE
Source :
Tongxin xuebao, Vol 43, Pp 1-13 (2022)
Publication Year :
2022
Publisher :
Editorial Department of Journal on Communications, 2022.

Abstract

To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted trajectories from owners, wait for encrypted interested trajectories from requesters, and compute trajectory similarity between an interested trajectory and stored trajectories in ciphertext domain without learning anything about users’ trajectories.To compute a trajectory similarity over encrypted trajectories efficiently, a secure trajectory similarity computation protocol with longest common subsequence was proposed, which used somewhat homomorphic encryption and secure comparison protocol to compute the length of longest common subsequence over two encrypted trajectories.Furthermore, a ciphertext compression algorithm was designed to improve efficiency.Theoretical analysis and experimental evaluations show that pTSC method is secure and efficient.

Details

Language :
Chinese
ISSN :
1000436X
Volume :
43
Database :
Directory of Open Access Journals
Journal :
Tongxin xuebao
Publication Type :
Academic Journal
Accession number :
edsdoj.bca653ac7d6405ea15d16eefb21adf3
Document Type :
article
Full Text :
https://doi.org/10.11959/j.issn.1000-436x.2022223