Achieving Privacy-Preserving Discrete Frechet Distance Range Queries

被引:7
作者
Guan, Yunguo [1 ]
Lu, Rongxing [1 ]
Zheng, Yandong [1 ]
Zhang, Songnian [1 ]
Shao, Jun [2 ]
Wei, Guiyi [2 ]
机构
[1] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B5A3, Canada
[2] Zhejiang Gongshang Univ, Hangzhou 310018, Zhejiang, Peoples R China
基金
加拿大自然科学与工程研究理事会;
关键词
Trajectory; Servers; Data privacy; Data models; Cloud computing; Task analysis; Internet of Things; Trajectory similarity; discrete Frechet distance; range query; privacy-preserving; outsourced encrypted data; ANONYMITY; SCHEME;
D O I
10.1109/TDSC.2022.3171980
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The advances in Internet of Things, Big Data, and machine learning technologies have greatly transformed our daily lives into much more intelligent ones by offering various promising services. Among those services, the discrete Frechet distance (DFD) range query, which aims to obtain a set of trajectories whose distances to a given query trajectory do not exceed a given threshold, has been widely applied to support applications such as vehicle trajectory clustering and other data processing tasks. Meanwhile, due to the huge data volume issue in the Big Data era, there is a trend towards outsourcing various query services to the cloud for achieving a better performance. However, since the cloud is not fully trustable, designing privacy-preserving query services becomes a research focus. Over the past years, many schemes focusing on privacy-preserving trajectory analysis have been proposed, but none of them can well support privacy-preserving DFD range queries. Aiming at addressing this challenge, this paper proposes a novel privacy-preserving DFD range query scheme, in which queries are conducted in a filtration-and-verification manner and the privacy of the dataset and queries can be preserved. Specifically, by indexing the dataset with two R-trees, a query can be conducted by i) querying the two R-trees to obtain a candidate set and ii) verifying each trajectory in the set, which involve two basic operations, namely, rectangle intersection detection and proximity detection. To preserve the privacy of the dataset and queries, we build the two basic operations upon a novel Inner-Product Preserving Encryption (IPPE) scheme, which is proved to be selectively secure with trivial leakages. Besides, extensive experiments are conducted, and the results demonstrate that our proposed scheme can significantly reduce the computational cost by effectively reducing the candidate set's size.
引用
收藏
页码:2097 / 2110
页数:14
相关论文
共 29 条
[1]  
Abul O, 2008, PROC INT CONF DATA, P376, DOI 10.1109/ICDE.2008.4497446
[2]   From Selective to Adaptive Security in Functional Encryption [J].
Ananth, Prabhanjan ;
Brakerski, Zvika ;
Segev, Gil ;
Vaikuntanathan, Vinod .
ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 :657-677
[3]  
[Anonymous], 2020, GLOBAL SMART CITIES
[4]   Review and Perspective for Distance-Based Clustering of Vehicle Trajectories [J].
Besse, Philippe C. ;
Guillouet, Brendan ;
Loubes, Jean-Michel ;
Royer, Francois .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2016, 17 (11) :3306-3317
[5]  
Chow CY, 2007, LECT NOTES COMPUT SC, V4605, P258
[6]  
De Caro A, 2011, IEEE SYMP COMP COMMU
[7]   TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing [J].
Gao, Sheng ;
Ma, Jianfeng ;
Shi, Weisong ;
Zhan, Guoxing ;
Sun, Cong .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (06) :874-887
[8]  
Garcia Y J., 1998, Proc. 6th ACM Symposium on Advances in GIS, P163
[9]  
Google, GUAV
[10]  
Guttman A., 1984, SIGMOD Record, V14, P47, DOI 10.1145/971697.602266