Trace Your Footprint: Efficient Spatial Keyword Query Over Encrypted Trajectory Data

With the popularity of mobile devices, spatial-textual trajectory query has been deployed in applications such as trajectory-based navigation and travel route recommendation. Massive trajectory data have been outsourced to cloud servers for storage and sharing such as spatial keyword search. However...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:IEEE transactions on information forensics and security Ročník 20; s. 11936 - 11949
Hlavní autoři: Miao, Yinbin, Wang, Xin, Zhang, Shu, Li, Xinghua, Xu, Shujiang, Liu, Zhiquan, Raymond Choo, Kim-Kwang, Deng, Robert H.
Médium: Journal Article
Jazyk:angličtina
Vydáno: IEEE 2025
Témata:
ISSN:1556-6013, 1556-6021
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract With the popularity of mobile devices, spatial-textual trajectory query has been deployed in applications such as trajectory-based navigation and travel route recommendation. Massive trajectory data have been outsourced to cloud servers for storage and sharing such as spatial keyword search. However, existing solutions only support similarity queries in the spatial dimension and still incur high storage and query costs, which cannot scale well in large-scale trajectory data scenarios. To solve the above issues, we first achieve an Efficient Range Query over Encrypted Trajectory Data (<inline-formula> <tex-math notation="LaTeX">\textsf {ERT} </tex-math></inline-formula>) using Douglas-Peucker trajectory compression algorithm, random matrix multiplication, filtering-verification mechanism and polynomial fitting technology. Then, we further propose an enhanced Efficient Spatial Keyword Query over Encrypted Trajectory Data (<inline-formula> <tex-math notation="LaTeX">\textsf {ESKT} </tex-math></inline-formula>) by constructing a unified spatial-textual index structure, which can find relevant trajectories that are within some arbitrary geometric range and contain all query keywords. Finally, we formally prove that our schemes are secure against chosen-plaintext-attack, and conduct extensive experiments to demonstrate that our schemes improve the query efficiency by almost <inline-formula> <tex-math notation="LaTeX">100\times </tex-math></inline-formula> when compared with state-of-the-art solutions.
AbstractList With the popularity of mobile devices, spatial-textual trajectory query has been deployed in applications such as trajectory-based navigation and travel route recommendation. Massive trajectory data have been outsourced to cloud servers for storage and sharing such as spatial keyword search. However, existing solutions only support similarity queries in the spatial dimension and still incur high storage and query costs, which cannot scale well in large-scale trajectory data scenarios. To solve the above issues, we first achieve an Efficient Range Query over Encrypted Trajectory Data (<inline-formula> <tex-math notation="LaTeX">\textsf {ERT} </tex-math></inline-formula>) using Douglas-Peucker trajectory compression algorithm, random matrix multiplication, filtering-verification mechanism and polynomial fitting technology. Then, we further propose an enhanced Efficient Spatial Keyword Query over Encrypted Trajectory Data (<inline-formula> <tex-math notation="LaTeX">\textsf {ESKT} </tex-math></inline-formula>) by constructing a unified spatial-textual index structure, which can find relevant trajectories that are within some arbitrary geometric range and contain all query keywords. Finally, we formally prove that our schemes are secure against chosen-plaintext-attack, and conduct extensive experiments to demonstrate that our schemes improve the query efficiency by almost <inline-formula> <tex-math notation="LaTeX">100\times </tex-math></inline-formula> when compared with state-of-the-art solutions.
Author Li, Xinghua
Miao, Yinbin
Wang, Xin
Xu, Shujiang
Deng, Robert H.
Liu, Zhiquan
Zhang, Shu
Raymond Choo, Kim-Kwang
Author_xml – sequence: 1
  givenname: Yinbin
  orcidid: 0000-0001-5437-3572
  surname: Miao
  fullname: Miao, Yinbin
  email: ybmiao@xidian.edu.cn
  organization: School of Cyber Engineering, Xidian University, Xi'an, China
– sequence: 2
  givenname: Xin
  orcidid: 0009-0002-3354-9342
  surname: Wang
  fullname: Wang, Xin
  email: wxsenator@163.com
  organization: School of Cyber Engineering, Xidian University, Xi'an, China
– sequence: 3
  givenname: Shu
  orcidid: 0009-0007-9690-335X
  surname: Zhang
  fullname: Zhang, Shu
  email: zhangshu0108@163.com
  organization: School of Cyber Engineering, Xidian University, Xi'an, China
– sequence: 4
  givenname: Xinghua
  orcidid: 0000-0002-5583-4155
  surname: Li
  fullname: Li, Xinghua
  email: xhli1@mail.xidian.edu.cn
  organization: State Key Laboratory of Integrated Service Networks, School of Cyber Engineering, Xidian University, Xi'an, China
– sequence: 5
  givenname: Shujiang
  orcidid: 0000-0001-9151-2834
  surname: Xu
  fullname: Xu, Shujiang
  email: xushj@sdas.org
  organization: Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China
– sequence: 6
  givenname: Zhiquan
  orcidid: 0000-0002-3934-2177
  surname: Liu
  fullname: Liu, Zhiquan
  email: zqliu@vip.qq.com
  organization: College of Cyber Security, Jinan University, Guangzhou, China
– sequence: 7
  givenname: Kim-Kwang
  orcidid: 0000-0001-9208-5336
  surname: Raymond Choo
  fullname: Raymond Choo, Kim-Kwang
  email: raymond.choo@fulbrightmail.org
  organization: Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA
– sequence: 8
  givenname: Robert H.
  orcidid: 0000-0003-3491-8146
  surname: Deng
  fullname: Deng, Robert H.
  email: robertdeng@smu.edu.sg
  organization: School of Information Systems, Singapore Management University, Bras Basah, Singapore
BookMark eNpFkM1Kw0AUhQepYFt9AMHFvEDq3Plr4k5qq8VCkcaFqzCTuQMpNSmTqZK3b0qLru6Be87h8I3IoG5qJOQe2ASAZY_5crGZcMbVRGguM8WuyBCU0olmHAZ_GsQNGbXtljEpQadDkufBlEi_mkOgi6aJ-1DV8YnOva_KCutIN3sTK7Oj79j9NsHRjwOGjq5_MNB5XYZuH9HRvmSLZWz6z4uJ5pZce7Nr8e5yx-RzMc9nb8lq_bqcPa-SknMWE8ddZq1DzmzGWWYZaA_GKe6nnk-BO2uZ5wKktFZOpZBOeZemIFDrzBgUYwLn3jI0bRvQF_38bxO6AlhxwlKcsBQnLMUFS595OGcqRPz3AweVghJHgNRhLg
CODEN ITIFA6
Cites_doi 10.1109/SP.2007.29
10.1109/TCC.2020.2999775
10.1109/TKDE.2017.2651821
10.1109/TIFS.2015.2506145
10.1109/JSYST.2022.3183153
10.1109/TDSC.2019.2897675
10.1016/j.cam.2010.12.025
10.1109/TDSC.2017.2693969
10.1109/ICDE.2013.6544835
10.1109/TIFS.2018.2868162
10.1109/TIFS.2023.3288453
10.1109/TMC.2021.3080714
10.1007/978-3-642-19379-8_4
10.1109/JIOT.2021.3138136
10.1109/JIOT.2022.3142933
10.1109/TMC.2024.3482321
10.1016/j.neucom.2020.02.130
10.1109/TCC.2020.3034232
10.1007/978-3-540-70936-7_29
10.1109/FSKD.2016.7603205
10.1109/ICDE.2015.7113273
10.1145/2557547.2557559
10.1109/ICDE.2019.00097
10.1109/TCC.2021.3093304
10.1109/INFCOM.2010.5462174
10.1145/3196494.3196535
10.1109/ICC.2016.7511323
10.1109/TPDS.2015.2401003
10.1109/TNET.2015.2457493
10.1109/TrustCom53373.2021.00043
10.1145/1066157.1066213
10.1109/TKDE.2022.3152168
10.1145/1099554.1099584
10.1109/INFOCOM41043.2020.9155505
10.1145/2743025
10.1109/SECPRI.2000.848445
10.3138/FM57-6770-U75U-7727
10.1109/TKDE.2017.2787711
10.1109/TPDS.2010.203
ContentType Journal Article
DBID 97E
RIA
RIE
AAYXX
CITATION
DOI 10.1109/TIFS.2025.3624950
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Xplore (IEEE/IET Electronic Library - IEL)
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore (IEEE/IET Electronic Library - IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1556-6021
EndPage 11949
ExternalDocumentID 10_1109_TIFS_2025_3624950
11215815
Genre orig-research
GrantInformation_xml – fundername: Open Fund of Key Laboratory of Computing Power Network and Information Security
  grantid: 2023ZD020
– fundername: National Key Research and Development Program of China
  grantid: 2024YFB3108700
  funderid: 10.13039/501100012226
– fundername: National Cryptologic Science Fund of China
  grantid: 2025NCSF02031
  funderid: 10.13039/501100012166
– fundername: Fundamental Research Funds for the Central Universities
  grantid: QTZX24077
  funderid: 10.13039/501100012226
– fundername: National Natural Science Foundation of China
  grantid: 62125205; 61932011; U23A20303; 62372493
  funderid: 10.13039/501100001809
– fundername: Shaanxi Provincial Natural Science Foundation Project
  grantid: 2025JC-TBZC-12
GroupedDBID 0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
AAYXX
CITATION
ID FETCH-LOGICAL-c220t-d2d9bbde20b9209b016f1ad52f7f2712dbb0f23144bb47434d5fd8813e669aae3
IEDL.DBID RIE
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001615352700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1556-6013
IngestDate Sat Nov 29 06:53:02 EST 2025
Wed Nov 19 08:27:18 EST 2025
IsPeerReviewed true
IsScholarly true
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c220t-d2d9bbde20b9209b016f1ad52f7f2712dbb0f23144bb47434d5fd8813e669aae3
ORCID 0009-0002-3354-9342
0000-0001-9151-2834
0000-0003-3491-8146
0009-0007-9690-335X
0000-0002-3934-2177
0000-0001-9208-5336
0000-0001-5437-3572
0000-0002-5583-4155
PageCount 14
ParticipantIDs crossref_primary_10_1109_TIFS_2025_3624950
ieee_primary_11215815
PublicationCentury 2000
PublicationDate 20250000
2025-00-00
PublicationDateYYYYMMDD 2025-01-01
PublicationDate_xml – year: 2025
  text: 20250000
PublicationDecade 2020
PublicationTitle IEEE transactions on information forensics and security
PublicationTitleAbbrev TIFS
PublicationYear 2025
Publisher IEEE
Publisher_xml – name: IEEE
References ref13
ref35
ref12
ref34
ref15
ref37
ref36
ref31
ref30
ref11
ref33
ref10
ref32
ref2
ref1
Zhu (ref14)
ref17
ref39
ref16
ref38
ref19
ref18
ref24
ref23
ref26
ref25
ref20
ref22
ref21
ref28
ref27
ref29
ref8
ref7
ref9
ref4
ref3
ref6
ref5
ref40
References_xml – ident: ref17
  doi: 10.1109/SP.2007.29
– ident: ref39
  doi: 10.1109/TCC.2020.2999775
– ident: ref16
  doi: 10.1109/TKDE.2017.2651821
– ident: ref19
  doi: 10.1109/TIFS.2015.2506145
– ident: ref28
  doi: 10.1109/JSYST.2022.3183153
– ident: ref38
  doi: 10.1109/TDSC.2019.2897675
– ident: ref8
  doi: 10.1016/j.cam.2010.12.025
– ident: ref36
  doi: 10.1109/TDSC.2017.2693969
– ident: ref18
  doi: 10.1109/ICDE.2013.6544835
– ident: ref23
  doi: 10.1109/TIFS.2018.2868162
– ident: ref34
  doi: 10.1109/TIFS.2023.3288453
– ident: ref13
  doi: 10.1109/TMC.2021.3080714
– ident: ref40
  doi: 10.1007/978-3-642-19379-8_4
– ident: ref2
  doi: 10.1109/JIOT.2021.3138136
– ident: ref37
  doi: 10.1109/JIOT.2022.3142933
– ident: ref22
  doi: 10.1109/TMC.2024.3482321
– ident: ref29
  doi: 10.1016/j.neucom.2020.02.130
– ident: ref6
  doi: 10.1109/TCC.2020.3034232
– ident: ref11
  doi: 10.1007/978-3-540-70936-7_29
– ident: ref4
  doi: 10.1109/FSKD.2016.7603205
– ident: ref5
  doi: 10.1109/ICDE.2015.7113273
– ident: ref21
  doi: 10.1145/2557547.2557559
– ident: ref26
  doi: 10.1109/ICDE.2019.00097
– ident: ref7
  doi: 10.1109/TCC.2021.3093304
– ident: ref35
  doi: 10.1109/INFCOM.2010.5462174
– ident: ref10
  doi: 10.1145/3196494.3196535
– ident: ref20
  doi: 10.1109/ICC.2016.7511323
– ident: ref32
  doi: 10.1109/TPDS.2015.2401003
– ident: ref1
  doi: 10.1109/TNET.2015.2457493
– ident: ref9
  doi: 10.1109/TrustCom53373.2021.00043
– ident: ref15
  doi: 10.1145/1066157.1066213
– start-page: 499
  volume-title: Proc. Int. Conf. Extending Database Technol. (EDBT)
  ident: ref14
  article-title: Privacy preserving similarity evaluation of time series data
– ident: ref3
  doi: 10.1109/TKDE.2022.3152168
– ident: ref25
  doi: 10.1145/1099554.1099584
– ident: ref27
  doi: 10.1109/INFOCOM41043.2020.9155505
– ident: ref30
  doi: 10.1145/2743025
– ident: ref24
  doi: 10.1109/SECPRI.2000.848445
– ident: ref31
  doi: 10.3138/FM57-6770-U75U-7727
– ident: ref12
  doi: 10.1109/TKDE.2017.2787711
– ident: ref33
  doi: 10.1109/TPDS.2010.203
SSID ssj0044168
Score 2.4157329
Snippet With the popularity of mobile devices, spatial-textual trajectory query has been deployed in applications such as trajectory-based navigation and travel route...
SourceID crossref
ieee
SourceType Index Database
Publisher
StartPage 11936
SubjectTerms Accuracy
Costs
Electronic mail
Encryption
Filtering algorithms
filtering-verification mechanism
Fitting
Indexes
Polynomials
Spatial databases
spatial keyword query
spatial-textual index structure
Trajectory
trajectory compression
Trajectory query
Title Trace Your Footprint: Efficient Spatial Keyword Query Over Encrypted Trajectory Data
URI https://ieeexplore.ieee.org/document/11215815
Volume 20
WOSCitedRecordID wos001615352700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Xplore (IEEE/IET Electronic Library - IEL)
  customDbUrl:
  eissn: 1556-6021
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0044168
  issn: 1556-6013
  databaseCode: RIE
  dateStart: 20060101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELagYoCBQgFRXvLAhJTWcZwXG4JWIFABUaRukR2fJRiaKqSg_nvOTirKwMAWWXnp7uz77uzvjpBzhpA_hwS8yPjGE0EkPYljXgrAbETEYuOIwg_xaJRMJulTQ1Z3XBgAcIfPoGcv3V6-LvK5TZX1fVsKIbGU8vU4jmqy1nLZRbde897CMPIwygiaLUyfpf3x3fAFQ0Ee9nC5xoiA_XJCK11VnFMZtv_5Oztku0GP9KpW9y5Zg2mHtJedGWgzUTtka6XM4B4Zo0PKgeLELumwKCqby6su6cBVj8BPUNuXGO2Q3sPiC4NR-jyHckEf0crpYJqXixnCUooveXcp_gW9kZXcJ6_Dwfj61mu6KXg556zyNNepUho4UylnqUKsZ3ypQ25iw2Ofa6WYQbQnhFICcYXQodFJ4gcQRamUEByQ1rSYwiGhRgoRKMTlOgiEYQh5IBCJCoWCWOIS0SUXS_Fms7poRuaCDZZmVheZ1UXW6KJL9q1of25spHr0x_gx2bSP12mQE9Kqyjmcko38s3r7KM-cTXwDKlu0NA
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDI4QIAEHxlOMZw6ckDrSNH1xQ7Bp08YAMSRuVdI4Ehy2qXSg_XuctBNw4MCtiqq0ih37-5zYJuScIeTPIQEvMr7xRBBJT-KYlwIwy4hYbFyi8CAeDpOXl_ShTlZ3uTAA4C6fQcs-urN8PclnNlR26dtSCIlNKV8JheCsStdaGF507FXmWxhGHvKMoD7E9Fl6Oep1npAM8rCFBhs5Afvlhn70VXFupdP45w9tkc0aP9LrSuDbZAnGO6Sx6M1A6626QzZ-FBrcJSN0STlQ3NoF7UwmpY3mlVe07epH4Ceo7UyMmkj7MP9EOkofZ1DM6T3qOW2P82I-RWBKcZI3F-Sf01tZyj3y3GmPbrpe3U_Byzlnpae5TpXSwJlKOUsVoj3jSx1yExse-1wrxQziPSGUEogshA6NThI_gChKpYRgnyyPJ2M4INRIIQKFyFwHgTAMQQ8EIlGhUBBLNBJNcrFY3mxalc3IHN1gaWZlkVlZZLUsmmTPLu33i_WqHv4xfkbWuqO7QTboDftHZN1OVQVFjslyWczghKzmH-Xre3Hq9OMLuOi3ew
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Trace+Your+Footprint%3A+Efficient+Spatial+Keyword+Query+Over+Encrypted+Trajectory+Data&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=Miao%2C+Yinbin&rft.au=Wang%2C+Xin&rft.au=Zhang%2C+Shu&rft.au=Li%2C+Xinghua&rft.date=2025&rft.issn=1556-6013&rft.eissn=1556-6021&rft.volume=20&rft.spage=11936&rft.epage=11949&rft_id=info:doi/10.1109%2FTIFS.2025.3624950&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TIFS_2025_3624950
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon