Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment

被引:1
|
作者
Wu, Bin [1 ,2 ]
Chen, Xianyi [3 ]
Huang, Jinzhou [4 ]
Zhang, Caicai [5 ]
Wang, Jing [6 ]
Yu, Jing [1 ,2 ]
Zhao, Zhiqiang [7 ]
Mei, Zhuolin [1 ,2 ]
机构
[1] JiuJiang Univ, Sch Comp & Big Data Sci, Jiujiang 332005, Peoples R China
[2] Jiujiang Key Lab Network & Informat Secur, Informat Technol Ctr, Jiujiang 332005, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Peoples R China
[4] Hubei Univ Arts & Sci, Sch Comp Engn, Xiangyang 441053, Peoples R China
[5] Zhejiang Inst Mech & Elect Engn, Sch Modern Informat Technol, Hangzhou 310053, Peoples R China
[6] Jiangxi Changjiang Chem Co Ltd, Informat Ctr, Jiujiang 332005, Peoples R China
[7] Ningxia Normal Univ, Sch Math & Comp Sci, Guyuan 756099, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 78卷 / 03期
关键词
Privacy; -preserving; adjacency query; multi -keyword fuzzy search; encrypted graph; SIMILARITY QUERY; STRUCTURED DATA; BLOOM FILTER; EFFICIENT; SECURE;
D O I
10.32604/cmc.2023.047147
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a cloud environment, outsourced graph data is widely used in companies, enterprises, medical institutions, and so on. Data owners and users can save costs and improve efficiency by storing large amounts of graph data on cloud servers. Servers on cloud platforms usually have some subjective or objective attacks, which make the outsourced graph data in an insecure state. The issue of privacy data protection has become an important obstacle to data sharing and usage. How to query outsourcing graph data safely and effectively has become the focus of research. Adjacency query is a basic and frequently used operation in graph, and it will effectively promote the query range and query ability if multi-keyword fuzzy search can be supported at the same time. This work proposes to protect the privacy information of outsourcing graph data by encryption, mainly studies the problem of multi-keyword fuzzy adjacency query, and puts forward a solution. In our scheme, we use the Bloom filter and encryption mechanism to build a secure index and query token, and adjacency queries are implemented through indexes and query tokens on the cloud server. Our proposed scheme is proved by formal analysis, and the performance and effectiveness of the scheme are illustrated by experimental analysis. The research results of this work will provide solid theoretical and technical support for the further popularization and application of encrypted graph data processing technology.
引用
收藏
页码:3177 / 3194
页数:18
相关论文
共 50 条
  • [1] Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
    Wang, Bing
    Yu, Shucheng
    Lou, Wenjing
    Hou, Y. Thomas
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 2112 - 2120
  • [2] Privacy-Preserving Multi-Keyword Fuzzy Search over Outsourced Encrypted Cloud Data
    Shi, Xiu-jin
    Yang, Ling-zhen
    COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 505 - 513
  • [3] Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
    Cao, Ning
    Wang, Cong
    Li, Ming
    Ren, Kui
    Lou, Wenjing
    2011 PROCEEDINGS IEEE INFOCOM, 2011, : 829 - 837
  • [4] Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
    Cao, Ning
    Wang, Cong
    Li, Ming
    Ren, Kui
    Lou, Wenjing
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) : 222 - 233
  • [5] Privacy-preserving multi-keyword hybrid search over encrypted data in cloud
    Singh N.
    Kumar J.
    Singh A.K.
    Mohan A.
    Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (01) : 261 - 274
  • [6] Privacy-Preserving Ranked Multi-keyword Fuzzy Search on Cloud Encrypted Data Supporting Range Query
    Jie Wang
    Xiao Yu
    Ming Zhao
    Arabian Journal for Science and Engineering, 2015, 40 : 2375 - 2388
  • [7] Privacy-Preserving Ranked Multi-keyword Fuzzy Search on Cloud Encrypted Data Supporting Range Query
    Wang, Jie
    Yu, Xiao
    Zhao, Ming
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2015, 40 (08) : 2375 - 2388
  • [8] Privacy-Preserving and Ranked Search Using Advanced Multi-Keyword Scheme Over the Encrypted Cloud Environment
    Joshi, Narendra Shyam
    Sambrekar, Kuldeep P.
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (01) : 353 - 365
  • [9] An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking
    Cengiz Örencik
    Erkay Savaş
    Distributed and Parallel Databases, 2014, 32 : 119 - 160
  • [10] PMRS: A Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
    Bao, Jingjing
    Dai, Hua
    Yang, Maohu
    Yi, Xun
    Yang, Geng
    Liu, Liang
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2019, PT II, 2020, 11945 : 496 - 511