Privacy-Preserving Top-k Spatio-Textual Similarity Join

被引:0
|
作者
Teng, Yiping [1 ]
Jiang, Dongyue [1 ]
Sun, Mengmeng [1 ]
Zhao, Liang [1 ]
Xu, Li [1 ]
Fan, Chunlong [1 ]
机构
[1] Shenyang Aerosp Univ, Sch Comp, Shenyang, Peoples R China
来源
2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM | 2022年
基金
中国国家自然科学基金;
关键词
hybrid LSH; privacy; spatio-textual data; similarity join;
D O I
10.1109/TrustCom56396.2022.00102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of location-based services, spatio-textual similarity join has attracted much research attention from academic and industrial communities following the study of spatio-textual data processing. To offload the computation and storage burden of spatio-textual similarity join, outsourcing the data processing and storage to the public cloud can achieve great cost savings, however, may cause serious privacy concerns. To this end, in this paper, we first define and solve the privacy-preserving spatio-textual similarity join problem and propose two novel secure similarity join schemes. As the baseline, we first present a straightforward scheme applying Asymmetric Inner Product Encryption (AIPE) to facilitate the data encryption and similarity calculation in ciphertext. To improve the efficiency of the basic scheme, we further propose an optimized secure top-k spatio-textual similarity join scheme by constructing a secure index based on the hybrid Locality-Sensitive Hashing (LSH). Through matching the encrypted hash values over the secure index to narrow down the candidates, the similarity join results can be efficiently retrieved from the candidate pairs. Comprehensive analysis of the proposed schemes is provided in terms of computational complexity and security guarantees, and extensive experimental results on real and synthetic datasets show the performance of our schemes.
引用
收藏
页码:718 / 726
页数:9
相关论文
共 50 条
  • [41] K-Anonymity Based Approach For Privacy-Preserving Web Service Selection
    Ammar, Nariman
    Malik, Zaki
    Medjahed, Brahim
    Alodib, Mohammed
    2015 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS), 2015, : 281 - 288
  • [42] Efficient and Privacy-Preserving k-means clustering For Big Data Mining
    Gheid, Zakaria
    Challal, Yacine
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 791 - 798
  • [43] Privacy-Preserving k-means Clustering: an Application to Driving Style Recognition
    El Omri, Othmane
    Boudguiga, Aymen
    Izabachene, Malika
    Klaudel, Witold
    NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 685 - 696
  • [44] CCPT: Compression and Correctness-Preserving Top-k Query for Wireless Sensor Networks
    Tsou, Yao-Tung
    Chen, Yu-Shun
    IEEE SENSORS JOURNAL, 2018, 18 (18) : 7749 - 7758
  • [45] A New Functional Encryption Scheme Supporting Privacy-Preserving Maximum Similarity for Web Service Platforms
    Chen, Zhenhua
    Long, Kaili
    Xie, Junrui
    Lai, Qiqi
    Wang, Yilei
    Li, Ni
    Huang, Luqi
    Ge, Aijun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 2621 - 2631
  • [46] Sharing and Generating Privacy-Preserving Spatio-Temporal Data Using Real-World Knowledge
    Cunningham, Teddy
    2022 23RD IEEE INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2022), 2022, : 331 - 333
  • [47] Privacy-Preserving Travel Recommendation Based on Stay Points Over Outsourced Spatio-Temporal Data
    Han, Lulu
    Luo, Weiqi
    Lu, Rongxing
    Zheng, Yandong
    Yang, Anjia
    Lai, Junzuo
    Cheng, Yudan
    Zhang, Yongxin
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (10) : 12999 - 13013
  • [48] Revisiting Privacy-Preserving Min and k-th Min Protocols for Mobile Sensing
    Gao, Jiacheng
    Zhang, Yuan
    Zhong, Sheng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3211 - 3226
  • [49] Enabling Privacy-Preserving K-Hop Reachability Query Over Encrypted Graphs
    Song, Yunjiao
    Ge, Xinrui
    Yu, Jia
    Hao, Rong
    Yang, Ming
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (03) : 893 - 904
  • [50] Decentralized k-anonymization of trajectories via privacy-preserving tit-for-tat
    Domingo-Ferrer, Josep
    Martinez, Sergio
    Sanchez, David
    COMPUTER COMMUNICATIONS, 2022, 190 : 57 - 68