Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment

被引:1
|
作者
Wu, Bin [1 ,2 ]
Chen, Xianyi [3 ]
Huang, Jinzhou [4 ]
Zhang, Caicai [5 ]
Wang, Jing [6 ]
Yu, Jing [1 ,2 ]
Zhao, Zhiqiang [7 ]
Mei, Zhuolin [1 ,2 ]
机构
[1] JiuJiang Univ, Sch Comp & Big Data Sci, Jiujiang 332005, Peoples R China
[2] Jiujiang Key Lab Network & Informat Secur, Informat Technol Ctr, Jiujiang 332005, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Peoples R China
[4] Hubei Univ Arts & Sci, Sch Comp Engn, Xiangyang 441053, Peoples R China
[5] Zhejiang Inst Mech & Elect Engn, Sch Modern Informat Technol, Hangzhou 310053, Peoples R China
[6] Jiangxi Changjiang Chem Co Ltd, Informat Ctr, Jiujiang 332005, Peoples R China
[7] Ningxia Normal Univ, Sch Math & Comp Sci, Guyuan 756099, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 78卷 / 03期
关键词
Privacy; -preserving; adjacency query; multi -keyword fuzzy search; encrypted graph; SIMILARITY QUERY; STRUCTURED DATA; BLOOM FILTER; EFFICIENT; SECURE;
D O I
10.32604/cmc.2023.047147
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a cloud environment, outsourced graph data is widely used in companies, enterprises, medical institutions, and so on. Data owners and users can save costs and improve efficiency by storing large amounts of graph data on cloud servers. Servers on cloud platforms usually have some subjective or objective attacks, which make the outsourced graph data in an insecure state. The issue of privacy data protection has become an important obstacle to data sharing and usage. How to query outsourcing graph data safely and effectively has become the focus of research. Adjacency query is a basic and frequently used operation in graph, and it will effectively promote the query range and query ability if multi-keyword fuzzy search can be supported at the same time. This work proposes to protect the privacy information of outsourcing graph data by encryption, mainly studies the problem of multi-keyword fuzzy adjacency query, and puts forward a solution. In our scheme, we use the Bloom filter and encryption mechanism to build a secure index and query token, and adjacency queries are implemented through indexes and query tokens on the cloud server. Our proposed scheme is proved by formal analysis, and the performance and effectiveness of the scheme are illustrated by experimental analysis. The research results of this work will provide solid theoretical and technical support for the further popularization and application of encrypted graph data processing technology.
引用
收藏
页码:3177 / 3194
页数:18
相关论文
共 50 条
  • [21] Privacy-Preserving Fuzzy Multi-Keyword Search for Multiple Data Owners in Cloud Computing
    Chen, Lvhao
    Liao, Xiaofeng
    Mu, Nankun
    Wu, Jiahui
    Le, Junqing
    2019 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI 2019), 2019, : 2166 - 2171
  • [22] Privacy-preserving and Efficient Multi-keyword Search Over Encrypted Data on Blockchain
    Jiang, Shan
    Cao, Jiannong
    McCannt, Julie A.
    Yang, Yanni
    Liu, Yang
    Wang, Xiaoqing
    Deng, Yuming
    2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2019), 2019, : 405 - 410
  • [23] A Fast Privacy-Preserving Multi-keyword Search Scheme on Cloud Data
    Yang, Ce
    Zhang, Weiming
    Xu, Jun
    Xu, Jiajia
    Yu, Nenghai
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICE COMPUTING (CSC), 2012, : 104 - 110
  • [24] Privacy-preserving Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Dynamic Update
    Sun, Xingming
    Zhou, Lu
    Fu, Zhangjie
    Wang, Jin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (06): : 1 - 16
  • [25] Privacy Preserving Synonym Based Fuzzy Multi-Keyword Ranked Search Over Encrypted Cloud Data
    Mittal, Sneha A.
    Krishna, C. Rama
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1187 - +
  • [26] Privacy-Preserving Ranked Fuzzy Keyword Search over Encrypted Cloud Data
    Xu, Qunqun
    Shen, Hong
    Sang, Yingpeng
    Tian, Hui
    2013 INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES (PDCAT), 2013, : 239 - 245
  • [27] A Privacy-preserving Fuzzy Keyword Search Scheme over Encrypted Cloud Data
    Wang, Dongsheng
    Fu, Shaojing
    Xu, Ming
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 663 - 670
  • [28] A Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Data in Hybrid Clouds
    Dai, Hua
    Ji, Yan
    Yang, Geng
    Huang, Haiping
    Yi, Xun
    IEEE ACCESS, 2020, 8 : 4895 - 4907
  • [29] Privacy-Preserving Multi-Keyword Search in Information Networks
    Tang, Yuzhe
    Liu, Ling
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2015, 27 (09) : 2424 - 2437
  • [30] Highly Efficient Indexing for Privacy-Preserving Multi-keyword Query over Encrypted Cloud Data
    Cheng, Fangquan
    Wang, Qian
    Zhang, Qianwen
    Peng, Zhiyong
    WEB-AGE INFORMATION MANAGEMENT, WAIM 2014, 2014, 8485 : 348 - 359