Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment

被引:1
|
作者
Wu, Bin [1 ,2 ]
Chen, Xianyi [3 ]
Huang, Jinzhou [4 ]
Zhang, Caicai [5 ]
Wang, Jing [6 ]
Yu, Jing [1 ,2 ]
Zhao, Zhiqiang [7 ]
Mei, Zhuolin [1 ,2 ]
机构
[1] JiuJiang Univ, Sch Comp & Big Data Sci, Jiujiang 332005, Peoples R China
[2] Jiujiang Key Lab Network & Informat Secur, Informat Technol Ctr, Jiujiang 332005, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Peoples R China
[4] Hubei Univ Arts & Sci, Sch Comp Engn, Xiangyang 441053, Peoples R China
[5] Zhejiang Inst Mech & Elect Engn, Sch Modern Informat Technol, Hangzhou 310053, Peoples R China
[6] Jiangxi Changjiang Chem Co Ltd, Informat Ctr, Jiujiang 332005, Peoples R China
[7] Ningxia Normal Univ, Sch Math & Comp Sci, Guyuan 756099, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 78卷 / 03期
关键词
Privacy; -preserving; adjacency query; multi -keyword fuzzy search; encrypted graph; SIMILARITY QUERY; STRUCTURED DATA; BLOOM FILTER; EFFICIENT; SECURE;
D O I
10.32604/cmc.2023.047147
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a cloud environment, outsourced graph data is widely used in companies, enterprises, medical institutions, and so on. Data owners and users can save costs and improve efficiency by storing large amounts of graph data on cloud servers. Servers on cloud platforms usually have some subjective or objective attacks, which make the outsourced graph data in an insecure state. The issue of privacy data protection has become an important obstacle to data sharing and usage. How to query outsourcing graph data safely and effectively has become the focus of research. Adjacency query is a basic and frequently used operation in graph, and it will effectively promote the query range and query ability if multi-keyword fuzzy search can be supported at the same time. This work proposes to protect the privacy information of outsourcing graph data by encryption, mainly studies the problem of multi-keyword fuzzy adjacency query, and puts forward a solution. In our scheme, we use the Bloom filter and encryption mechanism to build a secure index and query token, and adjacency queries are implemented through indexes and query tokens on the cloud server. Our proposed scheme is proved by formal analysis, and the performance and effectiveness of the scheme are illustrated by experimental analysis. The research results of this work will provide solid theoretical and technical support for the further popularization and application of encrypted graph data processing technology.
引用
收藏
页码:3177 / 3194
页数:18
相关论文
共 50 条
  • [41] A privacy-preserving multi-keyword ranked retrieval scheme in cloud computing
    Li, Yuancheng
    Hou, Haiyan
    Chen, Wenping
    INFORMATION SECURITY JOURNAL, 2020, 29 (06): : 284 - 296
  • [42] Lightweight and Privacy-Preserving Multi-Keyword Search over Outsourced Data
    Zhao, Meng
    Liu, Lingang
    Ding, Yong
    Deng, Hua
    Liang, Hai
    Wang, Huiyong
    Wang, Yujue
    APPLIED SCIENCES-BASEL, 2023, 13 (05):
  • [43] One privacy-preserving multi-keyword ranked search scheme revisited
    Cao Z.
    Wang X.
    Liu L.
    International Journal of Information and Computer Security, 2021, 16 (3-4) : 375 - 384
  • [44] Semantic Multi-Keyword Search over Encrypted Cloud Data with Privacy Preservation
    Hsieh, Fei-Ju
    Chin, Tai-Lin
    Huang, Chin-Ya
    Shen, Shan-Hsiang
    Shen, Chung-An
    2019 IEEE 90TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-FALL), 2019,
  • [45] Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking
    Sun, Wenhai
    Wang, Bing
    Cao, Ning
    Li, Ming
    Lou, Wenjing
    Hou, Y. Thomas
    Li, Hui
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (11) : 3025 - 3035
  • [46] Novel Multi-Keyword Search on Encrypted Data in the Cloud
    Wu, Yunyun
    Hou, Jingyu
    Liu, Jing
    Zhou, Wanlei
    Yao, Shaowen
    IEEE ACCESS, 2019, 7 : 31984 - 31996
  • [47] Fuzzy Multi-Keyword Query on Encrypted Data in the Cloud
    Shi, Xiu-jin
    Hu, Sheng-ping
    2016 4TH INTL CONF ON APPLIED COMPUTING AND INFORMATION TECHNOLOGY/3RD INTL CONF ON COMPUTATIONAL SCIENCE/INTELLIGENCE AND APPLIED INFORMATICS/1ST INTL CONF ON BIG DATA, CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (ACIT-CSII-BCD), 2016, : 419 - 425
  • [48] EPSMR: An efficient privacy-preserving semantic-aware multi-keyword ranked search scheme in cloud
    Liu, Yuanlong
    Dai, Hua
    Zhou, Qian
    Li, Pengyue
    Yi, Xun
    Yang, Geng
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 159 : 1 - 14
  • [49] Efficient dynamic multi-keyword fuzzy search over encrypted cloud data
    Zhong, Hong
    Li, Zhanfei
    Cui, Jie
    Sun, Yue
    Liu, Lu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 149
  • [50] Efficient privacy-preserving scheme supporting disjunctive multi-keyword search with ranking
    Handa, Rohit
    Krishna, C. Rama
    Aggarwal, Naveen
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (02):