Privacy-Preserving Public Route Planning Based on Passenger Capacity

被引:0
|
作者
Zhang, Xin [1 ]
Zhang, Hua [1 ]
Li, Kaixuan [1 ]
Wen, Qiaoyan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
public route planning; reverse trajectory query; encrypted trajectory database; NEAREST-NEIGHBOR QUERIES; REVERSE;
D O I
10.3390/math11061546
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Precise route planning needs huge amounts of trajectory data recorded in multimedia devices. The data, including each user's location privacy, are stored as cipher text. The ability to plan routes on an encrypted trajectory database is an urgent necessity. In this paper, in order to plan a public route while protecting privacy, we design a hybrid encrypted random bloom filter (RBF) tree on encrypted databases, named the encrypted random bloom filter (eRBF) tree, which supports pruning and a secure, fast k nearest neighbor search. Based on the encrypted random bloom filter tree and secure computation of distance, we first propose a reverse k nearest neighbor trajectory search on encrypted databases (RkNNToE). It returns all transitions, in which each takes the query trajectory as one of its k nearest neighbor trajectories on the encrypted database. The results can be the indicator of a new route's capacity in route planning. The security of the trajectory and query is proven via the simulation proof technique. When the number of points in the trajectory database and transition database are 1174 and 18,670, respectively, the time cost of an R2NNToE is about 1200 s.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Privacy-Preserving Cooperative Route Planning
    Florian, Martin
    Finster, Soeren
    Baumgart, Ingmar
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (06): : 590 - 599
  • [2] A privacy-preserving route planning scheme for the Internet of Vehicles
    Atmaca, Ugur Ilker
    Maple, Carsten
    Epiphaniou, Gregory
    Dianati, Mehrdad
    [J]. AD HOC NETWORKS, 2021, 123
  • [3] HPRoP: Hierarchical Privacy-preserving Route Planning for Smart Cities
    Tiausas, Francis
    Yasumoto, Keiichi
    Talusan, Jose Paolo
    Yamana, Hayato
    Yamaguchi, Hirozumi
    Bhattacharjee, Shameek
    Dubey, Abhishek
    Das, Sajal K.
    [J]. ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2023, 7 (04)
  • [4] A Privacy-Preserving Route Leak Protection Mechanism Based on Blockchain
    Yue, Jiarui
    Qin, Yajuan
    Gao, Shuai
    Su, Wei
    He, Guobiao
    Liu, Ningchun
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING (ICICSE 2021), 2021, : 264 - 269
  • [5] Privacy-Preserving Observation in Public Spaces
    Kerschbaum, Florian
    Lim, Hoon Wei
    [J]. COMPUTER SECURITY - ESORICS 2015, PT II, 2015, 9327 : 81 - 100
  • [6] Privacy-Preserving Photo Sharing based on a Public Key Infrastructure
    Yuan, Lin
    McNally, David
    Kupcu, Alptekin
    Ebrahimi, Touradj
    [J]. APPLICATIONS OF DIGITAL IMAGE PROCESSING XXXVIII, 2015, 9599
  • [7] Privacy-Preserving Public Transport Ticketing System
    Milutinovic, Milica
    Decroix, Koen
    Naessens, Vincent
    De Decker, Bart
    [J]. Data and Applications Security and Privacy XXIX, 2015, 9149 : 135 - 150
  • [8] Privacy-Preserving Public Information for Sequential Games
    Blum, Avrim
    Morgenstern, Jamie
    Sharma, Ankit
    Smith, Adam
    [J]. PROCEEDINGS OF THE 6TH INNOVATIONS IN THEORETICAL COMPUTER SCIENCE (ITCS'15), 2015, : 173 - 180
  • [9] Width-based search for multi agent privacy-preserving planning
    Gerevini, Alfonso E.
    Lipovetzky, Nir
    Percassi, Francesco
    Saetti, Alessandro
    Serina, Ivan
    [J]. ARTIFICIAL INTELLIGENCE, 2023, 318
  • [10] Privacy-Preserving Searchable Encryption Scheme Based on Public and Private Blockchains
    Du, Ruizhong
    Ma, Caixia
    Li, Mingyue
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2023, 28 (01) : 13 - 26