Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment

被引:1
|
作者
Wu, Bin [1 ,2 ]
Chen, Xianyi [3 ]
Huang, Jinzhou [4 ]
Zhang, Caicai [5 ]
Wang, Jing [6 ]
Yu, Jing [1 ,2 ]
Zhao, Zhiqiang [7 ]
Mei, Zhuolin [1 ,2 ]
机构
[1] JiuJiang Univ, Sch Comp & Big Data Sci, Jiujiang 332005, Peoples R China
[2] Jiujiang Key Lab Network & Informat Secur, Informat Technol Ctr, Jiujiang 332005, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Peoples R China
[4] Hubei Univ Arts & Sci, Sch Comp Engn, Xiangyang 441053, Peoples R China
[5] Zhejiang Inst Mech & Elect Engn, Sch Modern Informat Technol, Hangzhou 310053, Peoples R China
[6] Jiangxi Changjiang Chem Co Ltd, Informat Ctr, Jiujiang 332005, Peoples R China
[7] Ningxia Normal Univ, Sch Math & Comp Sci, Guyuan 756099, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 78卷 / 03期
关键词
Privacy; -preserving; adjacency query; multi -keyword fuzzy search; encrypted graph; SIMILARITY QUERY; STRUCTURED DATA; BLOOM FILTER; EFFICIENT; SECURE;
D O I
10.32604/cmc.2023.047147
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a cloud environment, outsourced graph data is widely used in companies, enterprises, medical institutions, and so on. Data owners and users can save costs and improve efficiency by storing large amounts of graph data on cloud servers. Servers on cloud platforms usually have some subjective or objective attacks, which make the outsourced graph data in an insecure state. The issue of privacy data protection has become an important obstacle to data sharing and usage. How to query outsourcing graph data safely and effectively has become the focus of research. Adjacency query is a basic and frequently used operation in graph, and it will effectively promote the query range and query ability if multi-keyword fuzzy search can be supported at the same time. This work proposes to protect the privacy information of outsourcing graph data by encryption, mainly studies the problem of multi-keyword fuzzy adjacency query, and puts forward a solution. In our scheme, we use the Bloom filter and encryption mechanism to build a secure index and query token, and adjacency queries are implemented through indexes and query tokens on the cloud server. Our proposed scheme is proved by formal analysis, and the performance and effectiveness of the scheme are illustrated by experimental analysis. The research results of this work will provide solid theoretical and technical support for the further popularization and application of encrypted graph data processing technology.
引用
收藏
页码:3177 / 3194
页数:18
相关论文
共 50 条
  • [31] Privacy-Preserving Multi-Keyword Top-k Similarity Search Over Encrypted Data
    Ding, Xiaofeng
    Liu, Peng
    Jin, Hai
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (02) : 344 - 357
  • [32] A Privacy-Preserving Multi-keyword Ranked Search Scheme over Encrypted Cloud Data using MIR-tree
    Gurjar, Sonu Pratap Singh
    Pasupuleti, Syam Kumar
    2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 533 - 538
  • [33] Privacy-Preserving and Forward Public Key Encryption With Field-Free Multi-Keyword Search for Cloud Encrypted Data
    Lu, Yang
    Li, Jiguo
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (04) : 3619 - 3630
  • [34] Efficient Privacy Preserving of Multi-keyword Ranked Search Model over Encrypted Cloud Computing
    Mlgheit, Jassim R.
    Houssein, Essam H.
    Zayed, Hala H.
    2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018), 2018,
  • [35] SAPMS: A Semantic-Aware Privacy-Preserving Multi-keyword Search Scheme in Cloud
    Zhou, Qian
    Dai, Hua
    Hu, Zheng
    Liu, Yuanlong
    Yang, Geng
    WEB AND BIG DATA, PT I, APWEB-WAIM 2022, 2023, 13421 : 251 - 263
  • [36] Privacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing
    Ren, Yanzhi
    Chen, Yingying
    Yang, Jie
    Xie, Bin
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 594 - 600
  • [37] Multi-User Multi-Keyword Privacy Preserving Ranked Based Search Over Encrypted Cloud Data
    Rane, Deepali D.
    Ghorpade, V. R.
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [38] Efficient Multi-Keyword Fuzzy Search on Encrypted Data in Cloud Storage
    Li, Xiehua
    Cui, Yaping
    Zhou, Maoren
    Zhang, Cao
    Wang, Yanlong
    2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2017, : 288 - 294
  • [39] Multi-keyword Fuzzy Search over Encrypted Cloud Storage Data
    Li, Mengmeng
    Wang, Guijuan
    Liu, Suhui
    Yu, Jiguo
    2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020), 2021, 187 : 365 - 370
  • [40] Verifiable Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
    Wei, Xue
    Zhang, Hua
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS AND INFORMATION TECHNOLOGY PROCESSING (AMITP 2016), 2016, 60 : 271 - 277