Trace Your Footprint: Efficient Spatial Keyword Query Over Encrypted Trajectory Data
With the popularity of mobile devices, spatial-textual trajectory query has been deployed in applications such as trajectory-based navigation and travel route recommendation. Massive trajectory data have been outsourced to cloud servers for storage and sharing such as spatial keyword search. However...
Saved in:
| Published in: | IEEE transactions on information forensics and security Vol. 20; pp. 11936 - 11949 |
|---|---|
| Main Authors: | , , , , , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
IEEE
2025
|
| Subjects: | |
| ISSN: | 1556-6013, 1556-6021 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | With the popularity of mobile devices, spatial-textual trajectory query has been deployed in applications such as trajectory-based navigation and travel route recommendation. Massive trajectory data have been outsourced to cloud servers for storage and sharing such as spatial keyword search. However, existing solutions only support similarity queries in the spatial dimension and still incur high storage and query costs, which cannot scale well in large-scale trajectory data scenarios. To solve the above issues, we first achieve an Efficient Range Query over Encrypted Trajectory Data (<inline-formula> <tex-math notation="LaTeX">\textsf {ERT} </tex-math></inline-formula>) using Douglas-Peucker trajectory compression algorithm, random matrix multiplication, filtering-verification mechanism and polynomial fitting technology. Then, we further propose an enhanced Efficient Spatial Keyword Query over Encrypted Trajectory Data (<inline-formula> <tex-math notation="LaTeX">\textsf {ESKT} </tex-math></inline-formula>) by constructing a unified spatial-textual index structure, which can find relevant trajectories that are within some arbitrary geometric range and contain all query keywords. Finally, we formally prove that our schemes are secure against chosen-plaintext-attack, and conduct extensive experiments to demonstrate that our schemes improve the query efficiency by almost <inline-formula> <tex-math notation="LaTeX">100\times </tex-math></inline-formula> when compared with state-of-the-art solutions. |
|---|---|
| AbstractList | With the popularity of mobile devices, spatial-textual trajectory query has been deployed in applications such as trajectory-based navigation and travel route recommendation. Massive trajectory data have been outsourced to cloud servers for storage and sharing such as spatial keyword search. However, existing solutions only support similarity queries in the spatial dimension and still incur high storage and query costs, which cannot scale well in large-scale trajectory data scenarios. To solve the above issues, we first achieve an Efficient Range Query over Encrypted Trajectory Data (<inline-formula> <tex-math notation="LaTeX">\textsf {ERT} </tex-math></inline-formula>) using Douglas-Peucker trajectory compression algorithm, random matrix multiplication, filtering-verification mechanism and polynomial fitting technology. Then, we further propose an enhanced Efficient Spatial Keyword Query over Encrypted Trajectory Data (<inline-formula> <tex-math notation="LaTeX">\textsf {ESKT} </tex-math></inline-formula>) by constructing a unified spatial-textual index structure, which can find relevant trajectories that are within some arbitrary geometric range and contain all query keywords. Finally, we formally prove that our schemes are secure against chosen-plaintext-attack, and conduct extensive experiments to demonstrate that our schemes improve the query efficiency by almost <inline-formula> <tex-math notation="LaTeX">100\times </tex-math></inline-formula> when compared with state-of-the-art solutions. |
| Author | Li, Xinghua Miao, Yinbin Wang, Xin Xu, Shujiang Deng, Robert H. Liu, Zhiquan Zhang, Shu Raymond Choo, Kim-Kwang |
| Author_xml | – sequence: 1 givenname: Yinbin orcidid: 0000-0001-5437-3572 surname: Miao fullname: Miao, Yinbin email: ybmiao@xidian.edu.cn organization: School of Cyber Engineering, Xidian University, Xi'an, China – sequence: 2 givenname: Xin orcidid: 0009-0002-3354-9342 surname: Wang fullname: Wang, Xin email: wxsenator@163.com organization: School of Cyber Engineering, Xidian University, Xi'an, China – sequence: 3 givenname: Shu orcidid: 0009-0007-9690-335X surname: Zhang fullname: Zhang, Shu email: zhangshu0108@163.com organization: School of Cyber Engineering, Xidian University, Xi'an, China – sequence: 4 givenname: Xinghua orcidid: 0000-0002-5583-4155 surname: Li fullname: Li, Xinghua email: xhli1@mail.xidian.edu.cn organization: State Key Laboratory of Integrated Service Networks, School of Cyber Engineering, Xidian University, Xi'an, China – sequence: 5 givenname: Shujiang orcidid: 0000-0001-9151-2834 surname: Xu fullname: Xu, Shujiang email: xushj@sdas.org organization: Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China – sequence: 6 givenname: Zhiquan orcidid: 0000-0002-3934-2177 surname: Liu fullname: Liu, Zhiquan email: zqliu@vip.qq.com organization: College of Cyber Security, Jinan University, Guangzhou, China – sequence: 7 givenname: Kim-Kwang orcidid: 0000-0001-9208-5336 surname: Raymond Choo fullname: Raymond Choo, Kim-Kwang email: raymond.choo@fulbrightmail.org organization: Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA – sequence: 8 givenname: Robert H. orcidid: 0000-0003-3491-8146 surname: Deng fullname: Deng, Robert H. email: robertdeng@smu.edu.sg organization: School of Information Systems, Singapore Management University, Bras Basah, Singapore |
| BookMark | eNpFkM1Kw0AUhQepYFt9AMHFvEDq3Plr4k5qq8VCkcaFqzCTuQMpNSmTqZK3b0qLru6Be87h8I3IoG5qJOQe2ASAZY_5crGZcMbVRGguM8WuyBCU0olmHAZ_GsQNGbXtljEpQadDkufBlEi_mkOgi6aJ-1DV8YnOva_KCutIN3sTK7Oj79j9NsHRjwOGjq5_MNB5XYZuH9HRvmSLZWz6z4uJ5pZce7Nr8e5yx-RzMc9nb8lq_bqcPa-SknMWE8ddZq1DzmzGWWYZaA_GKe6nnk-BO2uZ5wKktFZOpZBOeZemIFDrzBgUYwLn3jI0bRvQF_38bxO6AlhxwlKcsBQnLMUFS595OGcqRPz3AweVghJHgNRhLg |
| CODEN | ITIFA6 |
| Cites_doi | 10.1109/SP.2007.29 10.1109/TCC.2020.2999775 10.1109/TKDE.2017.2651821 10.1109/TIFS.2015.2506145 10.1109/JSYST.2022.3183153 10.1109/TDSC.2019.2897675 10.1016/j.cam.2010.12.025 10.1109/TDSC.2017.2693969 10.1109/ICDE.2013.6544835 10.1109/TIFS.2018.2868162 10.1109/TIFS.2023.3288453 10.1109/TMC.2021.3080714 10.1007/978-3-642-19379-8_4 10.1109/JIOT.2021.3138136 10.1109/JIOT.2022.3142933 10.1109/TMC.2024.3482321 10.1016/j.neucom.2020.02.130 10.1109/TCC.2020.3034232 10.1007/978-3-540-70936-7_29 10.1109/FSKD.2016.7603205 10.1109/ICDE.2015.7113273 10.1145/2557547.2557559 10.1109/ICDE.2019.00097 10.1109/TCC.2021.3093304 10.1109/INFCOM.2010.5462174 10.1145/3196494.3196535 10.1109/ICC.2016.7511323 10.1109/TPDS.2015.2401003 10.1109/TNET.2015.2457493 10.1109/TrustCom53373.2021.00043 10.1145/1066157.1066213 10.1109/TKDE.2022.3152168 10.1145/1099554.1099584 10.1109/INFOCOM41043.2020.9155505 10.1145/2743025 10.1109/SECPRI.2000.848445 10.3138/FM57-6770-U75U-7727 10.1109/TKDE.2017.2787711 10.1109/TPDS.2010.203 |
| ContentType | Journal Article |
| DBID | 97E RIA RIE AAYXX CITATION |
| DOI | 10.1109/TIFS.2025.3624950 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE All-Society Periodicals Package (ASPP) 1998-Present IEEE Electronic Library (IEL) CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1556-6021 |
| EndPage | 11949 |
| ExternalDocumentID | 10_1109_TIFS_2025_3624950 11215815 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Open Fund of Key Laboratory of Computing Power Network and Information Security grantid: 2023ZD020 – fundername: National Key Research and Development Program of China grantid: 2024YFB3108700 funderid: 10.13039/501100012226 – fundername: National Cryptologic Science Fund of China grantid: 2025NCSF02031 funderid: 10.13039/501100012166 – fundername: Fundamental Research Funds for the Central Universities grantid: QTZX24077 funderid: 10.13039/501100012226 – fundername: National Natural Science Foundation of China grantid: 62125205; 61932011; U23A20303; 62372493 funderid: 10.13039/501100001809 – fundername: Shaanxi Provincial Natural Science Foundation Project grantid: 2025JC-TBZC-12 |
| GroupedDBID | 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P PQQKQ RIA RIE RNS AAYXX CITATION |
| ID | FETCH-LOGICAL-c220t-d2d9bbde20b9209b016f1ad52f7f2712dbb0f23144bb47434d5fd8813e669aae3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001615352700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1556-6013 |
| IngestDate | Sat Nov 29 06:53:02 EST 2025 Wed Nov 19 08:27:18 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c220t-d2d9bbde20b9209b016f1ad52f7f2712dbb0f23144bb47434d5fd8813e669aae3 |
| ORCID | 0009-0002-3354-9342 0000-0001-9151-2834 0000-0003-3491-8146 0009-0007-9690-335X 0000-0002-3934-2177 0000-0001-9208-5336 0000-0001-5437-3572 0000-0002-5583-4155 |
| PageCount | 14 |
| ParticipantIDs | crossref_primary_10_1109_TIFS_2025_3624950 ieee_primary_11215815 |
| PublicationCentury | 2000 |
| PublicationDate | 20250000 2025-00-00 |
| PublicationDateYYYYMMDD | 2025-01-01 |
| PublicationDate_xml | – year: 2025 text: 20250000 |
| PublicationDecade | 2020 |
| PublicationTitle | IEEE transactions on information forensics and security |
| PublicationTitleAbbrev | TIFS |
| PublicationYear | 2025 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| References | ref13 ref35 ref12 ref34 ref15 ref37 ref36 ref31 ref30 ref11 ref33 ref10 ref32 ref2 ref1 Zhu (ref14) ref17 ref39 ref16 ref38 ref19 ref18 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 |
| References_xml | – ident: ref17 doi: 10.1109/SP.2007.29 – ident: ref39 doi: 10.1109/TCC.2020.2999775 – ident: ref16 doi: 10.1109/TKDE.2017.2651821 – ident: ref19 doi: 10.1109/TIFS.2015.2506145 – ident: ref28 doi: 10.1109/JSYST.2022.3183153 – ident: ref38 doi: 10.1109/TDSC.2019.2897675 – ident: ref8 doi: 10.1016/j.cam.2010.12.025 – ident: ref36 doi: 10.1109/TDSC.2017.2693969 – ident: ref18 doi: 10.1109/ICDE.2013.6544835 – ident: ref23 doi: 10.1109/TIFS.2018.2868162 – ident: ref34 doi: 10.1109/TIFS.2023.3288453 – ident: ref13 doi: 10.1109/TMC.2021.3080714 – ident: ref40 doi: 10.1007/978-3-642-19379-8_4 – ident: ref2 doi: 10.1109/JIOT.2021.3138136 – ident: ref37 doi: 10.1109/JIOT.2022.3142933 – ident: ref22 doi: 10.1109/TMC.2024.3482321 – ident: ref29 doi: 10.1016/j.neucom.2020.02.130 – ident: ref6 doi: 10.1109/TCC.2020.3034232 – ident: ref11 doi: 10.1007/978-3-540-70936-7_29 – ident: ref4 doi: 10.1109/FSKD.2016.7603205 – ident: ref5 doi: 10.1109/ICDE.2015.7113273 – ident: ref21 doi: 10.1145/2557547.2557559 – ident: ref26 doi: 10.1109/ICDE.2019.00097 – ident: ref7 doi: 10.1109/TCC.2021.3093304 – ident: ref35 doi: 10.1109/INFCOM.2010.5462174 – ident: ref10 doi: 10.1145/3196494.3196535 – ident: ref20 doi: 10.1109/ICC.2016.7511323 – ident: ref32 doi: 10.1109/TPDS.2015.2401003 – ident: ref1 doi: 10.1109/TNET.2015.2457493 – ident: ref9 doi: 10.1109/TrustCom53373.2021.00043 – ident: ref15 doi: 10.1145/1066157.1066213 – start-page: 499 volume-title: Proc. Int. Conf. Extending Database Technol. (EDBT) ident: ref14 article-title: Privacy preserving similarity evaluation of time series data – ident: ref3 doi: 10.1109/TKDE.2022.3152168 – ident: ref25 doi: 10.1145/1099554.1099584 – ident: ref27 doi: 10.1109/INFOCOM41043.2020.9155505 – ident: ref30 doi: 10.1145/2743025 – ident: ref24 doi: 10.1109/SECPRI.2000.848445 – ident: ref31 doi: 10.3138/FM57-6770-U75U-7727 – ident: ref12 doi: 10.1109/TKDE.2017.2787711 – ident: ref33 doi: 10.1109/TPDS.2010.203 |
| SSID | ssj0044168 |
| Score | 2.415817 |
| Snippet | With the popularity of mobile devices, spatial-textual trajectory query has been deployed in applications such as trajectory-based navigation and travel route... |
| SourceID | crossref ieee |
| SourceType | Index Database Publisher |
| StartPage | 11936 |
| SubjectTerms | Accuracy Costs Electronic mail Encryption Filtering algorithms filtering-verification mechanism Fitting Indexes Polynomials Spatial databases spatial keyword query spatial-textual index structure Trajectory trajectory compression Trajectory query |
| Title | Trace Your Footprint: Efficient Spatial Keyword Query Over Encrypted Trajectory Data |
| URI | https://ieeexplore.ieee.org/document/11215815 |
| Volume | 20 |
| WOSCitedRecordID | wos001615352700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1556-6021 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0044168 issn: 1556-6013 databaseCode: RIE dateStart: 20060101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELagYoCBQimivOSBCSmt49hOwoagEQipgChSt8iOHQmGtAopKP-es5OKMjCwJVEe1t3Z933n3B1CF5kD4r72VKYEEJSAeVEApwR8I-ADIwXXrtlEOJlEs1n81Caru1wYY4z7-cwM7aHby9fzbGlDZSPflkKIbEr5ZhiKJllrteyCW2_y3jgXHrCMoN3C9Ek8mt4nL0AFKR_Ccg2MgPxyQmtdVZxTSbr_HM4e2m3RI75u1L2PNkzRQ91VZwbcTtQe2lkrM3iApuCQMoNhYpc4mc8rG8urrvDYVY-AT2DblxjsED-Y-gvIKH5emrLGj2DleFxkZb0AWIrhJe8uxF_jW1nJPnpNxtObO6_tpuBllJLK01THSmlDiYopiRVgvdyXmtM8zGnoU60UyQHtMaYUA1zBNM91FPmBESKW0gSHqFPMC3OEMBFKcqJFFuSCAQJUjElf8TA0XEtB9QBdrsSbLpqiGakjGyROrS5Sq4u01cUA9a1of25spXr8x_UTtG0fb8Igp6hTlUtzhrayz-rtozx3NvENNlG0Dw |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwELVQQQIGCqWI8umBCSmt49hOwoagVSuggChSt8iOHQmGtgopqP-es5OKMjCwJVHkRHdn33tn3x1CF6kD4r72VKoEEJSAeVEAtwR8I-ADIwXXrtlEOBxG43H8VCWru1wYY4w7fGba9tLt5etpOrehso5vSyFENqV8nTNGSZmutVx4wbGXmW-cCw94RlBtYvok7owGvRcgg5S3YcEGTkB-uaGVvirOrfTq__yhXbRT4Ud8XSp8D62ZSQPVl70ZcDVVG2h7pdDgPhqBS0oNhqmd4950WthoXnGFu65-BHwC287EYIn4ziy-gI7i57nJF_gR7Bx3J2m-mAEwxTDIuwvyL_CtLGQTvfa6o5u-V_VT8FJKSeFpqmOltKFExZTECtBe5kvNaRZmNPSpVopkgPcYU4oBsmCaZzqK_MAIEUtpggNUm0wn5hBhIpTkRIs0yAQDDKgYk77iYWi4loLqFrpcijeZlWUzEkc3SJxYXSRWF0mlixZqWtH-vFhJ9eiP5-dosz96uE_uB8O7Y7RlhyqDIieoVuRzc4o20s_i7SM_c_bxDcI4t1Y |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Trace+Your+Footprint%3A+Efficient+Spatial+Keyword+Query+Over+Encrypted+Trajectory+Data&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=Miao%2C+Yinbin&rft.au=Wang%2C+Xin&rft.au=Zhang%2C+Shu&rft.au=Li%2C+Xinghua&rft.date=2025&rft.issn=1556-6013&rft.eissn=1556-6021&rft.volume=20&rft.spage=11936&rft.epage=11949&rft_id=info:doi/10.1109%2FTIFS.2025.3624950&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TIFS_2025_3624950 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon |