Efficient secure similarity computation on encrypted trajectory data

作者: An Liu , Kai Zhengy , Lu Liz , Guanfeng Liu , Lei Zhao

DOI: 10.1109/ICDE.2015.7113273

关键词:

摘要: Outsourcing database to clouds is a scalable and cost-effective way for large scale data storage, management, query processing. Trajectory contain rich spatio-temporal relationships reveal many forms of individual sensitive information (e.g., home address, health condition), which necessitate them be encrypted before being outsourced privacy concerns. However, efficient processing over trajectory very challenging task. Though some achievements have been reported recently simple queries SQL queries, kNN queries) on data, there rather limited progress secure evaluation because they are more complex need special treatment. In this paper, we focus similarity computation that the cornerstone More specifically, propose an solution securely compute between two trajectories, reveals nothing about but final result. We theoretically prove our against semi-honest adversaries model as all intermediate in protocols can simulated polynomial time. Finally empirically study efficiency proposed method, demonstrates feasibility solution.

参考文章(34)
Ke Deng, Kexin Xie, Kevin Zheng, Xiaofang Zhou, Trajectory Indexing and Retrieval Computing with Spatial Trajectories. pp. 35- 60 ,(2011) , 10.1007/978-1-4614-1629-6_2
Chi-Yin Chow, Mohemad F. Mokbel, Privacy of Spatial Trajectories Computing with Spatial Trajectories. pp. 109- 141 ,(2011) , 10.1007/978-1-4614-1629-6_4
Eamonn Keogh, Chapter 36 – Exact Indexing of Dynamic Time Warping very large data bases. pp. 406- 417 ,(2002) , 10.1016/B978-155860869-6/50043-3
Yannis Theodoridis, Christian S. Jensen, Dieter Pfoser, Novel Approaches in Query Processing for Moving Object Trajectories very large data bases. pp. 395- 406 ,(2000)
Benjamin C. M. Fung, Bipin C. Desai, Rui Chen, Differentially Private Trajectory Data Publication arXiv: Databases. ,(2011)
Hakan Hacıgümüş, Bala Iyer, Sharad Mehrotra, Efficient Execution of Aggregation Queries over Encrypted Relational Databases database systems for advanced applications. pp. 125- 136 ,(2004) , 10.1007/978-3-540-24571-1_10
Vladimir Kolesnikov, Thomas Schneider, Improved Garbled Circuit: Free XOR Gates and Applications Automata, Languages and Programming. pp. 486- 498 ,(2008) , 10.1007/978-3-540-70583-3_40
Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider, Twin Clouds: Secure Cloud Computing with Low Latency Communications and Multimedia Security. pp. 32- 44 ,(2011) , 10.1007/978-3-642-24712-5_3
Dongxu Shao, Kaifeng Jiang, Thomas Kister, Stéphane Bressan, Kian-Lee Tan, Publishing Trajectory with Differential Privacy: A Priori vs. A Posteriori Sampling Mechanisms Lecture Notes in Computer Science. pp. 357- 365 ,(2013) , 10.1007/978-3-642-40285-2_31