Privacy-preserving local clustering coefficient query on structured encrypted graphs

被引:1
|
作者
Pan, Yingying [1 ]
Chen, Lanxiang [1 ,2 ]
Chen, Gaolin [1 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
[2] City Univ Macau, Fac Data Sci, Macau 999078, Peoples R China
基金
中国国家自然科学基金;
关键词
Local clustering coefficient; Structured encryption; Graph encryption; PSI; Encrypted graph analysis;
D O I
10.1016/j.comnet.2024.110895
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Graphs and graph databases serve as the fundamental building blocks for various network structures. In real- world network scenarios, nodes often aggregate due to their approximate organizational associations with each other. The local clustering coefficient, which evaluates the proximity of nodes within a graph, plays an important role in quantifying the structural properties of graphs in scrutinizing network robustness and understanding its intricate dynamics. Despite the growing popularity of easily accessible cloud services among small and medium-sized enterprises as well as individuals, the potential risk of data privacy disclosure when outsourcing large graphs to third-party servers is increasing. It is vital to explore a technique for executing queries on encrypted graph data. In this paper, we propose a structured encryption scheme to achieve privacy- preserving local clustering coefficient query ( STE-CC ) on the outsourced encrypted graphs. To calculate the clustering coefficient, we design the PSI sum protocol to sum the number of intersections, in which the basic private set intersection (PSI) protocol combines Bloom filter (BF) and garbled Bloom filter (GBF) to perform the private matching for counting the number of common neighbors. When configured with appropriate parameters, it can achieve no false negatives and negligible false positives. Finally, the security analysis and experimental evaluation on real-world graph data substantiate the effectiveness and efficiency of our approach.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Privacy-Preserving Correlation Coefficient
    Mimoto, Tomoaki
    Yokoyama, Hiroyuki
    Nakamura, Toru
    Isohara, Takamasa
    Hashimoto, Masayuki
    Kojima, Ryosuke
    Hasegawa, Aki
    Okuno, Yasushi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2023, E106D (05) : 868 - 876
  • [32] Privacy-preserving distributed clustering
    Erkin, Zekeriya
    Veugen, Thijs
    Toft, Tomas
    Lagendijk, Reginald L.
    EURASIP JOURNAL ON INFORMATION SECURITY, 2013, (01):
  • [33] Privacy-Preserving Reachability Query Services
    Yin, Shuxiang
    Fan, Zhe
    Yi, Peipei
    Choi, Byron
    Xu, Jianliang
    Zhou, Shuigeng
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2014, PT I, 2014, 8421 : 203 - 219
  • [34] Privacy-preserving Computation over Encrypted Vectors
    Hu, Rui
    Ding, Wenxiu
    Yan, Zheng
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [35] Privacy-Preserving SVM Computing in the Encrypted Domain
    Maekawa, Takahiro
    Kawamura, Ayana
    Kinoshita, Yuma
    Kiya, Hitoshi
    2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 897 - 902
  • [36] Differential Privacy-Preserving Recommendation Algorithm Based on Bhattacharyya Coefficient Clustering
    Wang Y.
    Yin E.-M.
    Ran X.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2021, 44 (02): : 81 - 88
  • [37] Efficient and Privacy-Preserving Categorization for Encrypted EMR
    Zhao, Zhiliang
    Zeng, Shengke
    Cheng, Shuai
    Hao, Fei
    MATHEMATICS, 2023, 11 (03)
  • [38] Achieving Efficient and Privacy-Preserving (α, β)-Core Query Over Bipartite Graphs in Cloud
    Guan, Yunguo
    Lu, Rongxing
    Zheng, Yandong
    Zhang, Songnian
    Shao, Jun
    Wei, Guiyi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 1979 - 1993
  • [39] Privacy-Preserving Any-Hop Cover Shortest Distance Queries on Encrypted Graphs
    Zhao, Xueling
    Wang, Minghui
    Jia, Zhuliang
    Li, Shundong
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (09): : 16517 - 16528
  • [40] Efficient and Privacy-Preserving Encode-Based Range Query Over Encrypted Cloud Data
    Liang, Yanrong
    Ma, Jianfeng
    Miao, Yinbin
    Su, Yuan
    Deng, Robert H.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 9085 - 9099