Privacy-preserving local clustering coefficient query on structured encrypted graphs

被引:1
|
作者
Pan, Yingying [1 ]
Chen, Lanxiang [1 ,2 ]
Chen, Gaolin [1 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
[2] City Univ Macau, Fac Data Sci, Macau 999078, Peoples R China
基金
中国国家自然科学基金;
关键词
Local clustering coefficient; Structured encryption; Graph encryption; PSI; Encrypted graph analysis;
D O I
10.1016/j.comnet.2024.110895
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Graphs and graph databases serve as the fundamental building blocks for various network structures. In real- world network scenarios, nodes often aggregate due to their approximate organizational associations with each other. The local clustering coefficient, which evaluates the proximity of nodes within a graph, plays an important role in quantifying the structural properties of graphs in scrutinizing network robustness and understanding its intricate dynamics. Despite the growing popularity of easily accessible cloud services among small and medium-sized enterprises as well as individuals, the potential risk of data privacy disclosure when outsourcing large graphs to third-party servers is increasing. It is vital to explore a technique for executing queries on encrypted graph data. In this paper, we propose a structured encryption scheme to achieve privacy- preserving local clustering coefficient query ( STE-CC ) on the outsourced encrypted graphs. To calculate the clustering coefficient, we design the PSI sum protocol to sum the number of intersections, in which the basic private set intersection (PSI) protocol combines Bloom filter (BF) and garbled Bloom filter (GBF) to perform the private matching for counting the number of common neighbors. When configured with appropriate parameters, it can achieve no false negatives and negligible false positives. Finally, the security analysis and experimental evaluation on real-world graph data substantiate the effectiveness and efficiency of our approach.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing
    Cao, Ning
    Yang, Zhenyu
    Wang, Cong
    Ren, Kui
    Lou, Wenjing
    31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, : 393 - 402
  • [2] Enabling Privacy-Preserving K-Hop Reachability Query Over Encrypted Graphs
    Song, Yunjiao
    Ge, Xinrui
    Yu, Jia
    Hao, Rong
    Yang, Ming
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (03) : 893 - 904
  • [3] Privacy-preserving query over the encrypted image in cloud computing
    Zhu, Xudong
    Li, Hui
    Guo, Zhen
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2014, 41 (02): : 151 - 158
  • [4] Efficient and Privacy-Preserving Eclipse Query over Encrypted Data
    Song, Weiyu
    Zhang, Yonggang
    Sun, Lili
    Zheng, Yandong
    Lu, Rongxing
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 1 - 6
  • [5] Privacy-Preserving Reachability Query Services for Sparse Graphs
    Yi, Peipei
    Fan, Zhe
    Yin, Shuxiang
    2014 IEEE 30TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOPS (ICDEW), 2014, : 32 - 35
  • [6] Efficient and privacy-preserving butterfly counting on encrypted bipartite graphs
    Pang, Xin
    Chen, Lanxiang
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 89
  • [7] PrivateGraph: Privacy-Preserving Spectral Analysis of Encrypted Graphs in the Cloud
    Sharma, Sagar
    Powers, James
    Chen, Keke
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2019, 31 (05) : 981 - 995
  • [8] Achieving Practical and Privacy-Preserving kNN Query Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Zhang, Songnian
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5479 - 5492
  • [9] An Efficient and Privacy-Preserving Range Query over Encrypted Cloud Data
    Wang, Wentao
    Jin, Yuxuan
    Cao, Bin
    2022 19TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY & TRUST (PST), 2022,
  • [10] Privacy-preserving reachability query over graphs with result verifiability
    Song, Yunjiao
    Ge, Xinrui
    Yu, Jia
    COMPUTERS & SECURITY, 2023, 127