Privacy-Preserving Travel Recommendation Based on Stay Points Over Outsourced Spatio-Temporal Data

被引:1
|
作者
Han, Lulu [1 ,2 ]
Luo, Weiqi [2 ]
Lu, Rongxing [3 ]
Zheng, Yandong [4 ]
Yang, Anjia [2 ]
Lai, Junzuo [2 ]
Cheng, Yudan [5 ]
Zhang, Yongxin [1 ]
机构
[1] Luoyang Normal Univ, Sch Informat Sci, Luoyang 471022, Peoples R China
[2] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Peoples R China
[3] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
[4] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[5] Lanzhou Univ Technol, Sch Comp & Commun, Lanzhou 730050, Peoples R China
基金
中国国家自然科学基金;
关键词
Trajectory; Privacy; Servers; Data models; Accuracy; Semantics; Routing protocols; Privacy-preserving; stay point extraction; travel recommendation; Paillier cryptosystem; secure two-party computation; EFFICIENT; AWARE; QUERY;
D O I
10.1109/TITS.2024.3432029
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
With the pervasiveness of GPS-enabled devices, mobile users can directly visit the best travel routes matching their interests and obtain a better user experience via location-based travel recommendation services. As the number of queries grows, the travel agency for location-based travel recommendations tends to outsource its recommendation services to the cloud server. Since the travel agency's popular travel routes and raw trajectory data from mobile users contain sensitive information, privacy protection should be guaranteed. Although some schemes have been proposed to solve the privacy problems, no previous works related to the location-based recommendation are proposed over mobile users' raw trajectories. To solve this problem, we propose a privacy-preserving travel recommendation scheme based on stay points over the raw encrypted trajectory data. Specifically, we first propose an adapted longest common subsequence computation algorithm to measure the similarity of two trajectories. Second, to support some computations under ciphertext, we design several secure two-party computation (S2PC) primitives (e.g., secure division, secure mean coordinate, and secure comparison) based on the Paillier cryptosystem. Third, we implement secure stay points extraction and adapted longest common subsequence computation protocols via these secure computation primitives. Finally, we analyze the security of our proposed scheme in the semi-honest model and show that the privacy of mobile users' trajectories, query results, and the travel agency's popular travel routes are well protected. Meanwhile, we evaluate the performance of each secure computation primitive and conduct extensive experiments on synthetic datasets, and the experimental results show that our scheme is practical in the real applications.
引用
收藏
页码:12999 / 13013
页数:15
相关论文
共 50 条
  • [1] Fully privacy-preserving location recommendation in outsourced environments
    Han, Lulu
    Luo, Weiqi
    Yang, Anjia
    Zheng, Yandong
    Lu, Rongxing
    Lai, Junzuo
    Cheng, Yudan
    AD HOC NETWORKS, 2023, 141
  • [2] Privacy-Preserving Spatio-Temporal Keyword Search for Outsourced Location-Based Services
    Huang, Qinlong
    Du, Jiabao
    Yan, Guanyu
    Yang, Yixian
    Wei, Qinglin
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (06) : 3443 - 3456
  • [3] Privacy-Preserving Spatio-Temporal Patient Data Publishing
    Olawoyin, Anifat M.
    Leung, Carson K.
    Choudhury, Ratna
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2020, PT II, 2020, 12392 : 407 - 416
  • [4] Privacy-Preserving Polynomial Evaluation over Spatio-Temporal Data on an Untrusted Cloud Server
    Song, Wei
    Tang, Mengfei
    Yan, Qiben
    Shen, Yuan
    Cao, Yang
    Wang, Qian
    Peng, Zhiyong
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA 2021), PT I, 2021, 12681 : 474 - 490
  • [5] Outsourced privacy-preserving classification service over encrypted data
    Li, Tong
    Huang, Zhengan
    Li, Ping
    Liu, Zheli
    Jia, Chunfu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 106 : 100 - 110
  • [6] Ensuring location diversity in privacy-preserving spatio-temporal data publishing
    A. Ercument Cicek
    Mehmet Ercan Nergiz
    Yucel Saygin
    The VLDB Journal, 2014, 23 : 609 - 625
  • [7] Ensuring location diversity in privacy-preserving spatio-temporal data publishing
    Cicek, A. Ercument
    Nergiz, Mehmet Ercan
    Saygin, Yucel
    VLDB JOURNAL, 2014, 23 (04): : 609 - 625
  • [8] HAC: Model for Privacy-Preserving Outsourced Data Over Cloud
    Osman, Huda
    Siraj, Maheyzah Md
    Maarof, Mohd Aizaini
    2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC), 2021, : 168 - 171
  • [9] An Accurate and Privacy-Preserving Retrieval Scheme Over Outsourced Medical Images
    Zhu, Dan
    Zhu, Hui
    Wang, Xiangyu
    Lu, Rongxing
    Feng, Dengguo
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (02) : 913 - 926
  • [10] kTCQ: Achieving Privacy-Preserving k-Truss Community Queries Over Outsourced Data
    Guan, Yunguo
    Lu, Rongxing
    Zhang, Songnian
    Zheng, Yandong
    Shao, Jun
    Wei, Guiyi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2750 - 2765