Privacy-Preserving Top-k Spatio-Textual Similarity Join

被引:0
|
作者
Teng, Yiping [1 ]
Jiang, Dongyue [1 ]
Sun, Mengmeng [1 ]
Zhao, Liang [1 ]
Xu, Li [1 ]
Fan, Chunlong [1 ]
机构
[1] Shenyang Aerosp Univ, Sch Comp, Shenyang, Peoples R China
来源
2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM | 2022年
基金
中国国家自然科学基金;
关键词
hybrid LSH; privacy; spatio-textual data; similarity join;
D O I
10.1109/TrustCom56396.2022.00102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of location-based services, spatio-textual similarity join has attracted much research attention from academic and industrial communities following the study of spatio-textual data processing. To offload the computation and storage burden of spatio-textual similarity join, outsourcing the data processing and storage to the public cloud can achieve great cost savings, however, may cause serious privacy concerns. To this end, in this paper, we first define and solve the privacy-preserving spatio-textual similarity join problem and propose two novel secure similarity join schemes. As the baseline, we first present a straightforward scheme applying Asymmetric Inner Product Encryption (AIPE) to facilitate the data encryption and similarity calculation in ciphertext. To improve the efficiency of the basic scheme, we further propose an optimized secure top-k spatio-textual similarity join scheme by constructing a secure index based on the hybrid Locality-Sensitive Hashing (LSH). Through matching the encrypted hash values over the secure index to narrow down the candidates, the similarity join results can be efficiently retrieved from the candidate pairs. Comprehensive analysis of the proposed schemes is provided in terms of computational complexity and security guarantees, and extensive experimental results on real and synthetic datasets show the performance of our schemes.
引用
收藏
页码:718 / 726
页数:9
相关论文
共 50 条
  • [31] On the Privacy of the Count-Min Sketch: Extracting the Top-K Elements
    Sanchez-Macian, Alfonso
    Martinez, Jorge
    Reviriego, Pedro
    Liu, Shanshan
    Lombardi, Fabrizio
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2024, 12 (04) : 1056 - 1065
  • [32] Privacy-Preserving Implicit Authentication Protocol Using Cosine Similarity for Internet of Things
    Wei, Fushan
    Vijayakumar, Pandi
    Kumar, Neeraj
    Zhang, Ruijie
    Cheng, Qingfeng
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) : 5599 - 5606
  • [33] Privacy-Preserving Task Matching With Threshold Similarity Search via Vehicular Crowdsourcing
    Song, Fuyuan
    Qin, Zheng
    Liu, Dongxiao
    Zhang, Jixin
    Lin, Xiaodong
    Shen, Xuemin
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (07) : 7161 - 7175
  • [34] Privacy-Preserving Outsourced Similarity Test for Access Over Encrypted Data in the Cloud
    Yang, Dan
    Chen, Yu-Chi
    Ye, Shaozhen
    Tso, Raylin
    IEEE ACCESS, 2018, 6 : 63624 - 63634
  • [35] Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data
    Zhang, Songnian
    Ray, Suprio
    Lu, Rongxing
    Guan, Yunguo
    Zheng, Yandong
    Shao, Jun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 3770 - 3786
  • [36] Privacy-preserving k nearest neighbor query with authentication on road networks
    Yang, Shumei
    Tang, Shaohua
    Zhang, Xiao
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 134 : 25 - 36
  • [37] A novel target item-based similarity function in privacy-preserving collaborative filtering
    Yalcin, Emre
    Bilge, Alper
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (13) : 19433 - 19461
  • [38] Top-k Discovery Under Local Differential Privacy: An Adaptive Sampling Approach
    Du, Rong
    Ye, Qingqing
    Fu, Yue
    Hu, Haibo
    Huang, Kai
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (02) : 1763 - 1780
  • [39] PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud
    Zheng, Yandong
    Zhu, Hui
    Lu, Rongxing
    Guan, Yunguo
    Zhang, Songnian
    Wang, Fengwei
    Shao, Jun
    Li, Hui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2030 - 2045
  • [40] Secure fine-grained spatio-temporal Top-k queries in TMWSNs
    Ma, Xingpo
    Liang, Junbin
    Wang, Jianxin
    Wen, Sheng
    Wang, Tian
    Li, Yin
    Ma, Wenpeng
    Qi, Chuanda
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 86 : 174 - 184