kTCQ: Achieving Privacy-Preserving k-Truss Community Queries Over Outsourced Data

被引:3
作者
Guan, Yunguo [1 ]
Lu, Rongxing [2 ]
Zhang, Songnian [3 ]
Zheng, Yandong [3 ]
Shao, Jun [4 ]
Wei, Guiyi [4 ]
机构
[1] Eastern Michigan Univ, Sch Informat Secur & Appl Comp, Ypsilanti, MI 48197 USA
[2] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B5A3, Canada
[3] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[4] Zhejiang Gongshang Univ, Hangzhou 310018, Peoples R China
基金
加拿大自然科学与工程研究理事会;
关键词
Indexes; Servers; Cryptography; Privacy; Social networking (online); Homomorphic encryption; Data privacy; k-truss; community search; homomorphic encryption; outsourced graph data; privacy-preserving; SEARCH; SYSTEM;
D O I
10.1109/TDSC.2023.3317401
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Community search over graphs, which is believed as a powerful tool for locating subgraphs of closely related vertices, has received considerable attention in recent years, and k-truss is such a popular community search metric to obtain subgraphs in which every edge forms (k-2) triangles. In this paper, we particularly consider k-truss community query services, which will return all k-truss communities containing a given query vertex. As is known, when the size of graph grows, for achieving better performance, it is natural for a service provider to outsource the services to a powerful cloud. However, this stresses the need for privacy-preserving k-truss community query services, as the cloud server is not fully trustable. Over the past years, many schemes focusing on privacy-preserving graph computation have been put forth, but none of them can well support privacy-preserving k-truss community queries. Aiming at this challenge, we first propose a privacy-preserving k-truss community query scheme (kTCQ) by constructing boolean circuits with homomorphic encryption technique and a table-based index. After that, we also design an efficiency-enhanced version (kTCQ+) based on a stream cipher scheme to reduce the encrypted index's size and improve the query efficiency. Detailed security analysis shows that both kTCQ and kTCQ+ can well preserve data privacy and access pattern privacy, and extensive experimental results also demonstrate that kTCQ+ can observably reduce the size of encrypted index and the query time by 12x and 5.9x , respectively.
引用
收藏
页码:2750 / 2765
页数:16
相关论文
共 50 条
[31]   Privacy-Preserving Data Sharing Framework for High-Accurate Outsourced Computation [J].
Ma, Zhuoran ;
Ma, Jianfeng ;
Miao, Yinbin ;
Liu, Ximeng ;
Yang, Tengfei .
ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
[32]   A Privacy-Preserving Hybrid Cooperative Searching Scheme over Outsourced Cloud Data [J].
Zhang, Qiang ;
Liu, Qin ;
Wang, Guojun .
SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 :265-278
[33]   Efficient Privacy-Preserving Spatial Range Query Over Outsourced Encrypted Data [J].
Miao, Yinbin ;
Yang, Yutao ;
Li, Xinghua ;
Liu, Zhiquan ;
Li, Hongwei ;
Choo, Kim-Kwang Raymond ;
Deng, Robert H. H. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 :3921-3933
[34]   Enabling Privacy-Preserving K-Hop Reachability Query Over Encrypted Graphs [J].
Song, Yunjiao ;
Ge, Xinrui ;
Yu, Jia ;
Hao, Rong ;
Yang, Ming .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (03) :893-904
[35]   Achieving Efficient Privacy-Preserving Mixed Data Quality Assessment in Mobile Crowdsensing [J].
Huang, Chunpu ;
Zhang, Yuanyuan ;
Xiong, Jinbo ;
Bi, Renwan ;
Tian, Youliang .
IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (04) :3785-3799
[36]   Efficient and Privacy-preserving Online Face Recognition over Encrypted Outsourced Data [J].
Yang, Xiaopeng ;
Zhu, Hui ;
Lu, Rongxing ;
Liu, Ximeng ;
Li, Hui .
IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, :366-373
[37]   Privacy-Preserving Outsourced Similarity Test for Access Over Encrypted Data in the Cloud [J].
Yang, Dan ;
Chen, Yu-Chi ;
Ye, Shaozhen ;
Tso, Raylin .
IEEE ACCESS, 2018, 6 :63624-63634
[38]   Efficient and Privacy-Preserving Online Fingerprint Authentication Scheme over Outsourced Data [J].
Zhu, Hui ;
Wei, Qing ;
Yang, Xiaopeng ;
Lu, Rongxing ;
Li, Hui .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (02) :576-586
[39]   Achieving Efficient and Privacy-Preserving Set Containment Search Over Encrypted Data [J].
Zheng, Yandong ;
Lu, Rongxing ;
Guan, Yunguo ;
Shao, Jun ;
Zhu, Hui .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (05) :2604-2618
[40]   Privacy-Preserving Approximate Top-k Nearest Keyword Queries over Encrypted Graphs [J].
Shen, Meng ;
Wang, Minghui ;
Xu, Ke ;
Zhu, Liehuang .
2021 IEEE/ACM 29TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2021,