Privacy-Preserving Travel Recommendation Based on Stay Points Over Outsourced Spatio-Temporal Data

被引:1
|
作者
Han, Lulu [1 ,2 ]
Luo, Weiqi [2 ]
Lu, Rongxing [3 ]
Zheng, Yandong [4 ]
Yang, Anjia [2 ]
Lai, Junzuo [2 ]
Cheng, Yudan [5 ]
Zhang, Yongxin [1 ]
机构
[1] Luoyang Normal Univ, Sch Informat Sci, Luoyang 471022, Peoples R China
[2] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Peoples R China
[3] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
[4] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[5] Lanzhou Univ Technol, Sch Comp & Commun, Lanzhou 730050, Peoples R China
基金
中国国家自然科学基金;
关键词
Trajectory; Privacy; Servers; Data models; Accuracy; Semantics; Routing protocols; Privacy-preserving; stay point extraction; travel recommendation; Paillier cryptosystem; secure two-party computation; EFFICIENT; AWARE; QUERY;
D O I
10.1109/TITS.2024.3432029
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
With the pervasiveness of GPS-enabled devices, mobile users can directly visit the best travel routes matching their interests and obtain a better user experience via location-based travel recommendation services. As the number of queries grows, the travel agency for location-based travel recommendations tends to outsource its recommendation services to the cloud server. Since the travel agency's popular travel routes and raw trajectory data from mobile users contain sensitive information, privacy protection should be guaranteed. Although some schemes have been proposed to solve the privacy problems, no previous works related to the location-based recommendation are proposed over mobile users' raw trajectories. To solve this problem, we propose a privacy-preserving travel recommendation scheme based on stay points over the raw encrypted trajectory data. Specifically, we first propose an adapted longest common subsequence computation algorithm to measure the similarity of two trajectories. Second, to support some computations under ciphertext, we design several secure two-party computation (S2PC) primitives (e.g., secure division, secure mean coordinate, and secure comparison) based on the Paillier cryptosystem. Third, we implement secure stay points extraction and adapted longest common subsequence computation protocols via these secure computation primitives. Finally, we analyze the security of our proposed scheme in the semi-honest model and show that the privacy of mobile users' trajectories, query results, and the travel agency's popular travel routes are well protected. Meanwhile, we evaluate the performance of each secure computation primitive and conduct extensive experiments on synthetic datasets, and the experimental results show that our scheme is practical in the real applications.
引用
收藏
页码:12999 / 13013
页数:15
相关论文
共 50 条
  • [31] Enabling Efficient and Privacy-Preserving Health Query Over Outsourced Cloud
    Wang, Guoming
    Lu, Rongxing
    Guan, Yong Liang
    IEEE ACCESS, 2018, 6 : 70831 - 70842
  • [32] Privacy-Preserving Top-k Keyword Similarity Search over Outsourced Cloud Data
    Teng Yiping
    Cheng Xiang
    Su Sen
    Wang Yulong
    Shuang Kai
    CHINA COMMUNICATIONS, 2015, 12 (12) : 109 - 121
  • [33] Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user
    Wang X.
    Ma J.
    Miao Y.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (02): : 31 - 39
  • [34] Privacy-Preserving Multi-Keyword Fuzzy Search over Outsourced Encrypted Cloud Data
    Shi, Xiu-jin
    Yang, Ling-zhen
    COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 505 - 513
  • [35] Privacy-Preserving Top-k Keyword Similarity Search over Outsourced Cloud Data
    TENG Yiping
    CHENG Xiang
    SU Sen
    WANG Yulong
    SHUANG Kai
    中国通信, 2015, 12 (12) : 109 - 121
  • [36] Efficient Privacy-preserving Data Distribution in Outsourced Environments: A Fragmentation-based Approach
    Krishna, R. K. N. Sai
    Sayi, T. J. V. R. K. M. K.
    Mukkamala, R.
    Baruah, P. K.
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 589 - 595
  • [37] Privacy-Preserving Synthetic Data Generation for Recommendation Systems
    Liu, Fan
    Cheng, Zhiyong
    Chen, Huilin
    Wei, Yinwei
    Nie, Liqiang
    Kankanhalli, Mohan
    PROCEEDINGS OF THE 45TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL (SIGIR '22), 2022, : 1379 - 1389
  • [38] Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud
    Tu, Tengfei
    Rao, Lu
    Zhang, Hua
    Wen, Qiaoyan
    Xiao, Jia
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [39] TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET
    Zhang, Chuan
    Zhu, Liehuang
    Xu, Chang
    Sharif, Kashif
    Ding, Kai
    Liu, Ximeng
    Du, Xiaojiang
    Guizani, Mohsen
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (02) : 806 - 818
  • [40] Personalized Travel Recommendations Based on Asynchronous and Privacy-Preserving Mixed Logit Model
    Jian, Weitao
    He, Junshu
    Chen, Kunxu
    Xie, Jiemin
    Zhao, Juanjuan
    You, Linlin
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2025, 26 (02) : 2227 - 2238