Efficient and Private Federated Trajectory Matching
Abstract: Federated Trajectory Matching (FTM) is gaining increasing importance in big trajectory data analytics, supporting diverse applications such as public health, law enforcement, and emergency response. FTM retrieves trajectories that match with a query trajectory from a large-scale trajectory database, while safeguarding the privacy of trajectories in both the query and the database. A naive solution to FTM is to process the query through Secure Multi-Party Computation (SMC) across the entire database, which is inherently secure yet inevitably slow due to the massive secure operations. A promising acceleration strategy is to filter irrelevant trajectories from the database based on the query, thus reducing the SMC operations. However, a key challenge is how to publish the query in a way that both preserves privacy and enables efficient trajectory filtering. In this paper, we design GIST, a novel framework for efficient Federated Trajectory Matching. GIST is grounded in Geo-Indistinguishability, a privacy criterion dedicated to locations. It employs a new privacy mechanism for the query that facilitates efficient trajectory filtering. We theoretically prove the privacy guarantee of the mechanism and the accuracy of the filtering strategy of GIST. Extensive evaluations on five real datasets show that GIST is significantly faster and incurs up to 3 orders of magnitude lower communication cost than the state-of-the-arts.
- Y. Zheng, “Trajectory data mining: an overview,” ACM Transactions on Intelligent Systems and Technology, vol. 6, no. 3, pp. 1–41, 2015.
- C.-Y. Chow and M. F. Mokbel, “Trajectory privacy in location-based services and data publication,” SIGKDD Explorations Newsletter, vol. 13, no. 1, pp. 19–29, 2011.
- Y.-A. De Montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel, “Unique in the crowd: The privacy bounds of human mobility,” Scientific reports, vol. 3, no. 1, pp. 1–5, 2013.
- “Xinhua: Digital maps help China track people flows amid epidemic,” 2020. [Online]. Available: http://en.people.cn/n3/2020/0218/c90000-9658976.html
- D. Li, R. Hu, W. Huang, D. Li, X. Wang, and C. Hu, “Trajectory association for person re-identification,” Neural Processing Letter, vol. 53, no. 5, pp. 3267–3285, 2021.
- “BBC: Safe cities- Using smart tech for public security.” [Online]. Available: https://www.bbc.com/future/bespoke/specials/connected-world/government.html
- “The General Data Protection Regulation (GDPR).” [Online]. Available: https://eugdpr.org
- “California Consumer Privacy Act (CCPA).” [Online]. Available: https://www.caprivacy.org/
- F. Bayatbabolghani and M. Blanton, “Secure multi-party computation,” in CCS, 2018, pp. 2157–2159.
- Y. Lindell, “Secure multiparty computation,” Communications of the ACM, vol. 64, no. 1, pp. 86–96, 2020.
- A. Liu, K. Zheng, L. Liz, G. Liu, L. Zhao, and X. Zhou, “Efficient secure similarity computation on encrypted trajectory data,” in ICDE, 2015, pp. 66–77.
- S. Wagh, X. He, A. Machanavajjhala, and P. Mittal, “DP-cryptography: marrying differential privacy and cryptography in emerging applications,” Communications of the ACM, vol. 64, no. 2, pp. 84–93, 2021.
- X. He, A. Machanavajjhala, C. Flynn, and D. Srivastava, “Composing differential privacy and secure computation: A case study on scaling private record linkage,” in CCS, 2017, pp. 1389–1406.
- J. Bater, X. He, W. Ehrich, A. Machanavajjhala, and J. Rogers, “Shrinkwrap: efficient sql query processing in differentially private data federations,” PVLDB, vol. 12, no. 3, 2018.
- C. Wang, J. Bater, K. Nayak, and A. Machanavajjhala, “DP-sync: Hiding update patterns in secure outsourced databases with differential privacy,” in SIGMOD, 2021, pp. 1892–1905.
- C. Wang, J. Bater, K. Nayak, and A. Machanavajjhala, “IncShrink: architecting efficient outsourced databases using incremental mpc and differential privacy,” in SIGMOD, 2022, pp. 818–832.
- M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, “Geo-indistinguishability: Differential privacy for location-based systems,” in CCS, 2013, pp. 901–914.
- T. Cunningham, G. Cormode, H. Ferhatosmanoglu, and D. Srivastava, “Real-world trajectory sharing with local differential privacy,” PVLDB, vol. 14, no. 11, pp. 2283–2295, 2021.
- Y. Zhang, Q. Ye, R. Chen, H. Hu, and Q. Han, “Trajectory data collection with local differential privacy,” PVLDB, vol. 16, no. 10, pp. 2591–2604, 2023.
- “Obliv-C.” [Online]. Available: https://oblivc.org/
- S. Wang, Z. Bao, J. S. Culpepper, and G. Cong, “A survey on trajectory data management, analytics, and learning,” ACM Computing Surveys, vol. 54, no. 2, pp. 1–36, 2021.
- S. Šaltenis, C. S. Jensen, S. T. Leutenegger, and M. A. Lopez, “Indexing the positions of continuously moving objects,” in SIGMOD, 2000, pp. 331–342.
- M. Nanni and D. Pedreschi, “Time-focused clustering of trajectories of moving objects,” Journal of Intelligent Information Systems, vol. 27, pp. 267–289, 2006.
- H. Su, S. Liu, B. Zheng, X. Zhou, and K. Zheng, “A survey of trajectory distance measures and performance evaluation,” The VLDB Journal, vol. 29, pp. 3–32, 2020.
- J. Bater, G. Elliott, C. Eggen, S. Goel, A. N. Kho, and J. Rogers, “SMCQL: Secure query processing for private data networks.” PVLDB, vol. 10, no. 6, pp. 673–684, 2017.
- Y. Tong, X. Pan, Y. Zeng, Y. Shi, C. Xue, Z. Zhou, X. Zhang, L. Chen, Y. Xu, K. Xu et al., “Hu-Fu: Efficient and secure spatial queries over data federation,” PVLDB, vol. 15, no. 6, p. 1159, 2022.
- C. Dwork, F. McSherry, K. Nissim, and A. Smith, “Calibrating noise to sensitivity in private data analysis,” in TCC, 2006, pp. 265–284.
- C. Dwork, A. Roth et al., “The algorithmic foundations of differential privacy,” Foundations and Trends in Theoretical Computer Science, vol. 9, no. 3–4, pp. 211–407, 2014.
- Y. Zheng, X. Xie, W.-Y. Ma et al., “GeoLife: A collaborative social networking service among user, location and trajectory,” IEEE Data Engineering Bulletin, vol. 33, no. 2, pp. 32–39, 2010.
- Q. Liu, Y. Zeng, L. Chen, and X. Zheng, “Social-aware optimal electric vehicle charger deployment on road network,” in SIGSPATIAL, 2019, pp. 398–407.
- “SAIC Volkswagen.” [Online]. Available: https://www.svw-volkswagen.com/
- “Didi Chuxing.” [Online]. Available: http://www.didichuxing.com/
- “JinYinJian Technology.” [Online]. Available: http://www.yinjian.com/
- GNU MP: The GNU Multiple Precision Arithmetic Library, http://gmplib.org/.
- D. Hu, L. Chen, H. Fang, Z. Fang, T. Li, and Y. Gao, “Spatio-temporal trajectory similarity measures: A comprehensive survey and quantitative study,” arXiv preprint arXiv:2303.05012, 2023.
- B.-K. Yi, H. V. Jagadish, and C. Faloutsos, “Efficient retrieval of similar time sequences under time warping,” in ICDE, 1998, pp. 201–208.
- L. Chen and R. Ng, “On the marriage of lp-norms and edit distance,” in VLDB, 2004, pp. 792–803.
- L. Chen, M. T. Özsu, and V. Oria, “Robust and fast similarity search for moving object trajectories,” in SIGMOD, 2005, pp. 491–502.
- M. Vlachos, G. Kollios, and D. Gunopulos, “Discovering similar multidimensional trajectories,” in ICDE, 2002, pp. 673–684.
- X. Li, K. Zhao, G. Cong, C. S. Jensen, and W. Wei, “Deep representation learning for trajectory similarity computation,” in ICDE, 2018, pp. 617–628.
- Z. Fang, Y. Du, X. Zhu, D. Hu, L. Chen, Y. Gao, and C. S. Jensen, “Spatio-temporal trajectory similarity learning in road networks,” in SIGKDD, 2022, pp. 347–356.
- D. Xie, F. Li, and J. M. Phillips, “Distributed trajectory similarity search,” PVLDB, vol. 10, no. 11, pp. 1478–1489, 2017.
- S. Wang, Z. Bao, J. S. Culpepper, Z. Xie, Q. Liu, and X. Qin, “Torch: A search engine for trajectory data,” in SIGIR, 2018, pp. 535–544.
- H. Yuan and G. Li, “Distributed in-memory trajectory similarity search and join on road network,” in ICDE, 2019, pp. 1262–1273.
- Z. Shang, G. Li, and Z. Bao, “Dita: distributed in-memory trajectory analytics,” in SIGMOD, 2018, pp. 725–740.
- Z. Fang, L. Chen, Y. Gao, L. Pan, and C. S. Jensen, “Dragoon: a hybrid and efficient big trajectory management system for offline and online analytics,” The VLDB Journal, vol. 30, pp. 287–310, 2021.
- X. Ding, L. Chen, Y. Gao, C. S. Jensen, and H. Bao, “Ultraman: A unified platform for big trajectory data management and analytics,” PVLDB, vol. 11, no. 7, pp. 787–799, 2018.
- F. Jin, W. Hua, T. Zhou, J. Xu, M. Francia, M. E. Orlowska, and X. Zhou, “Trajectory-based spatiotemporal entity linking,” IEEE Transactions on Knowledge and Data Engineering, vol. 34, no. 9, pp. 4499–4513, 2020.
- Y. Xiao and L. Xiong, “Protecting locations with differential privacy under temporal correlations,” in CCS, 2015, pp. 1298–1309.
- Y. Cao, Y. Xiao, L. Xiong, and L. Bai, “PriSTE: from location privacy to spatiotemporal event privacy,” in ICDE, 2019, pp. 1606–1609.
- X. He, G. Cormode, A. Machanavajjhala, C. Procopiuc, and D. Srivastava, “Dpt: differentially private trajectory synthesis using hierarchical reference systems,” PVLDB, vol. 8, no. 11, pp. 1154–1165, 2015.
- F. Jin, W. Hua, B. Ruan, and X. Zhou, “Frequency-based randomization for guaranteeing differential privacy in spatial trajectories,” in ICDE, 2022, pp. 1727–1739.
- M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” in MobiSys, 2003, pp. 31–42.
- M. F. Mokbel, C.-Y. Chow, and W. G. Aref, “The new casper: Query processing for location services without compromising privacy,” in VLDB, vol. 6, 2006, pp. 763–774.
- G. Gidofalvi, X. Huang, and T. B. Pedersen, “Privacy-preserving data mining on moving object trajectories,” in MDM, 2007, pp. 60–68.
- N. Volgushev, M. Schwarzkopf, B. Getchell, M. Varia, A. Lapets, and A. Bestavros, “Conclave: secure multi-party computation on big data,” in EuroSys, 2019, pp. 1–18.
- J. Bater, Y. Park, X. He, X. Wang, and J. Rogers, “SAQE: practical privacy-preserving approximate query processing for data federations,” PVLDB, vol. 13, no. 12, pp. 2691–2705, 2020.
- Y. Shi, Y. Tong, Y. Zeng, Z. Zhou, B. Ding, and L. Chen, “Efficient approximate range aggregation over large-scale spatial data federation,” IEEE Transactions on Knowledge and Data Engineering, vol. 35, no. 1, pp. 418–430, 2021.
- Y. Wang and K. Yi, “Secure Yannakakis: Join-aggregate queries over private data,” in SIGMOD, 2021, pp. 1969–1981.
- K. Zhang, Y. Tong, Y. Shi, Y. Zeng, Y. Xu, L. Chen, Z. Zhou, K. Xu, W. Lv, and Z. Zheng, “Approximate k-nearest neighbor query over spatial data federation,” in DASFAA, 2023, pp. 351–368.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.