Privacy-Preserving Travel Recommendation Based on Stay Points Over Outsourced Spatio-Temporal Data

被引:1
|
作者
Han, Lulu [1 ,2 ]
Luo, Weiqi [2 ]
Lu, Rongxing [3 ]
Zheng, Yandong [4 ]
Yang, Anjia [2 ]
Lai, Junzuo [2 ]
Cheng, Yudan [5 ]
Zhang, Yongxin [1 ]
机构
[1] Luoyang Normal Univ, Sch Informat Sci, Luoyang 471022, Peoples R China
[2] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Peoples R China
[3] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
[4] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[5] Lanzhou Univ Technol, Sch Comp & Commun, Lanzhou 730050, Peoples R China
基金
中国国家自然科学基金;
关键词
Trajectory; Privacy; Servers; Data models; Accuracy; Semantics; Routing protocols; Privacy-preserving; stay point extraction; travel recommendation; Paillier cryptosystem; secure two-party computation; EFFICIENT; AWARE; QUERY;
D O I
10.1109/TITS.2024.3432029
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
With the pervasiveness of GPS-enabled devices, mobile users can directly visit the best travel routes matching their interests and obtain a better user experience via location-based travel recommendation services. As the number of queries grows, the travel agency for location-based travel recommendations tends to outsource its recommendation services to the cloud server. Since the travel agency's popular travel routes and raw trajectory data from mobile users contain sensitive information, privacy protection should be guaranteed. Although some schemes have been proposed to solve the privacy problems, no previous works related to the location-based recommendation are proposed over mobile users' raw trajectories. To solve this problem, we propose a privacy-preserving travel recommendation scheme based on stay points over the raw encrypted trajectory data. Specifically, we first propose an adapted longest common subsequence computation algorithm to measure the similarity of two trajectories. Second, to support some computations under ciphertext, we design several secure two-party computation (S2PC) primitives (e.g., secure division, secure mean coordinate, and secure comparison) based on the Paillier cryptosystem. Third, we implement secure stay points extraction and adapted longest common subsequence computation protocols via these secure computation primitives. Finally, we analyze the security of our proposed scheme in the semi-honest model and show that the privacy of mobile users' trajectories, query results, and the travel agency's popular travel routes are well protected. Meanwhile, we evaluate the performance of each secure computation primitive and conduct extensive experiments on synthetic datasets, and the experimental results show that our scheme is practical in the real applications.
引用
收藏
页码:12999 / 13013
页数:15
相关论文
共 50 条
  • [41] PDSR: A Privacy-Preserving Diversified Service Recommendation Method on Distributed Data
    Wang, Lina
    Yang, Huan
    Shen, Yiran
    Liu, Chao
    Qi, Lianyong
    Cheng, Xiuzhen
    Li, Feng
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (05) : 2733 - 2746
  • [42] Privacy preserving spatio-temporal attribute-based encryption for cloud applications
    Routray, Kasturi
    Bera, Padmalochan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2025, 28 (01):
  • [43] CAMPS: Efficient and privacy-preserving medical primary diagnosis over outsourced cloud
    Hua, Jiafeng
    Shi, Guozhen
    Zhu, Hui
    Wang, Fengwei
    Liu, Ximeng
    Li, Hao
    INFORMATION SCIENCES, 2020, 527 (527) : 560 - 575
  • [44] Privacy-preserving recommendation system based on user classification
    Luo, Junwei
    Yang, Xuechao
    Yi, Xun
    Han, Fengling
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 79
  • [45] A Blockchain-based Privacy-Preserving Recommendation Mechanism
    Lin, Liangjie
    Tian, Yuchen
    Liu, Yang
    2021 IEEE 5TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP), 2021, : 74 - 78
  • [46] Privacy-preserving recommendation system based on social relationships
    Yu, Simin
    Wang, Hao
    Su, Ye
    Niu, Ziyu
    Li, Zhi
    Liu, Jianjun
    Wang, Jiwei
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2024, 36 (02)
  • [47] Dynamic Outsourced Data Audit Scheme for Merkle Hash Grid-Based Fog Storage With Privacy-Preserving
    Gu, Ke
    Wang, XingQiang
    Li, Xiong
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2024, 9 (04): : 695 - 711
  • [48] Lightweight Outsourced Privacy-Preserving Heart Failure Prediction Based on GRU
    Ying, Zuobin
    Cao, Shuanglong
    Zhou, Peng
    Zhang, Shun
    Liu, Ximeng
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2019, PT II, 2020, 11945 : 521 - 536
  • [49] Achieving Efficient and Privacy-Preserving Location-Based Task Recommendation in Spatial Crowdsourcing
    Song, Fuyuan
    Liang, Jinwen
    Zhang, Chuan
    Fu, Zhangjie
    Qin, Zheng
    Guo, Song
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 4006 - 4023
  • [50] Lightweight and Privacy-Preserving IoT Service Recommendation Based on Learning to Hash
    Wan, Haoyang
    Wu, Yanping
    Yang, Yihong
    Yan, Chao
    Chi, Xiaoxiao
    Zhang, Xuyun
    Shen, Shigen
    TSINGHUA SCIENCE AND TECHNOLOGY, 2025, 30 (04): : 1793 - 1807