Efficient Secure Similarity Computation on Encrypted Trajectory Data

被引:0
|
作者
Liu, An [1 ,2 ]
Zheng, Kai [1 ,3 ]
Li, Lu [4 ]
Liu, Guanfeng [1 ,2 ]
Zhao, Lei [1 ,2 ]
Zhou, Xiaofang [1 ,3 ]
机构
[1] Soochow Univ, Sch Comp Sci & Technol, Suzhou, Peoples R China
[2] Collaborat Innovat Ctr Novel Software Technol & I, Nanjing, Jiangsu, Peoples R China
[3] Univ Queensland, Sch Informat Technol & Elect Engn, Brisbane, Qld, Australia
[4] Univ Sci & Technol China, Sch Comp Sci, Hefei, Anhui, Peoples R China
基金
澳大利亚研究理事会;
关键词
RANGE QUERIES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Outsourcing database to clouds is a scalable and cost-effective way for large scale data storage, management, and query processing. Trajectory data contain rich spatio-temporal relationships and reveal many forms of individual sensitive information (e.g., home address, health condition), which necessitate them to be encrypted before being outsourced for privacy concerns. However, efficient query processing over encrypted trajectory data is a very challenging task. Though some achievements have been reported very recently for simple queries (e.g., SQL queries, kNN queries) on encrypted data, there is rather limited progress on secure evaluation of trajectory queries because they are more complex and need special treatment. In this paper, we focus on secure trajectory similarity computation that is the cornerstone of secure trajectory query processing. More specifically, we propose an efficient solution to securely compute the similarity between two encrypted trajectories, which reveals nothing about the trajectories, but the final result. We theoretically prove that our solution is secure against the semi-honest adversaries model as all the intermediate information in our protocols can be simulated in polynomial time. Finally we empirically study the efficiency of the proposed method, which demonstrates the feasibility of our solution.
引用
收藏
页码:66 / 77
页数:12
相关论文
共 50 条
  • [1] Special issue on Secure Computation on Encrypted Data
    Chen, Jiageng
    He, Debiao
    Su, Chunhua
    Xia, Zhe
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 34 : 205 - 206
  • [2] SEMKC: Secure and Efficient Computation over Outsourced Data Encrypted under Multiple Keys
    Nayak, Sanjeet Kumar
    Tripathy, Somanath
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (01) : 414 - 428
  • [3] Secure Sequence Similarity Search on Encrypted Genomic Data
    Mahdi, Md Safiur Rahman
    Hasan, Mohammad Zahidul
    Mohammed, Noman
    2017 IEEE/ACM SECOND INTERNATIONAL CONFERENCE ON CONNECTED HEALTH - APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2017, : 205 - 213
  • [4] Efficient Trajectory Similarity Computation with Contrastive Learning
    Deng, Liwei
    Zhao, Yan
    Fu, Zidan
    Sun, Hao
    Liu, Shuncheng
    Zheng, Kai
    PROCEEDINGS OF THE 31ST ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2022, 2022, : 365 - 374
  • [5] Secure and Efficient Skyline Queries on Encrypted Data
    Liu, Jinfei
    Yang, Juncheng
    Xiong, Li
    Pei, Jian
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2019, 31 (07) : 1397 - 1411
  • [6] Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds
    Jinguo Li
    Mi Wen
    Kui Wu
    Kejie Lu
    Fengyong Li
    Hongjiao Li
    Peer-to-Peer Networking and Applications, 2019, 12 : 893 - 911
  • [7] Efficient Similarity Search over Encrypted Data
    Kuzu, Mehmet
    Islam, Mohammad Saiful
    Kantarcioglu, Murat
    2012 IEEE 28TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2012, : 1156 - 1167
  • [8] Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds
    Li, Jinguo
    Wen, Mi
    Wu, Kui
    Lu, Kejie
    Li, Fengyong
    Li, Hongjiao
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (04) : 893 - 911
  • [9] Towards an efficient and secure computation over outsourced encrypted data using distributed hash table
    Masood R.
    Pandey N.
    Rana Q.P.
    International Journal of Cloud Computing, 2022, 11 (03): : 217 - 233
  • [10] SECURE MULTI-PARTY COMPUTATION PROTOCOL FOR STATISTICAL COMPUTATION ON ENCRYPTED DATA
    Pathak, Rohit
    Joshi, Satyadhar
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING, 2009, : 78 - +