Efficient and privacy-preserving butterfly counting on encrypted bipartite graphs

被引:0
|
作者
Pang, Xin [1 ]
Chen, Lanxiang [1 ,2 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
[2] City Univ Macau, Fac Data Sci, Taipa 999078, Macao, Peoples R China
基金
中国国家自然科学基金;
关键词
Bipartite graphs; Structured encryption; Butterfly counting; Private set intersection;
D O I
10.1016/j.jisa.2024.103952
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bipartite graphs have numerous real-world applications, with the butterfly motif serving as a key higher order structure that models cohesion within these graphs. Analyzing butterflies is crucial fora comprehensive understanding of networks, making butterfly counting a significant focus for researchers. In recent years, various efficient methods for exact butterfly counting, along with sampling-based approximate schemes, have been proposed for plaintext bipartite graphs. However, these methods often overlook data privacy concerns, which are critical in real-world scenarios such as doctor-patient and user-item relationships. Additionally, traditional encryption methods do not work due to the nature of graph structures. To tackle these challenges, we propose two schemes for exact butterfly counting on encrypted b ipartite graphs (EB-BFC), enabling butterfly counting for specific vertices or edges to protect privacy of butterfly counting. Firstly, we demonstrate how structured encryption techniques could be used to encrypt the bipartite graph and construct a secure index, resulting in the efficient, privacy-preserving scheme EB-BFC1. Secondly, to ensure vertex data privacy, we propose a butterfly counting scheme based on Private Set Intersection, EB-BFC2. Finally, we demonstrate the security and efficiency of our proposed schemes through theoretical proofs and experiments on real-world datasets.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] Privacy-preserving authentication of trees and graphs
    Ashish Kundu
    Elisa Bertino
    International Journal of Information Security, 2013, 12 : 467 - 494
  • [42] A Privacy-Preserving Infrastructure to Monitor Encrypted DNS Logs
    Abdel-Rahman, Adam Oumar
    Levillain, Olivier
    Totel, Eric
    RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2023, 2023, 14529 : 185 - 199
  • [43] Encrypted Image Feature Extraction By Privacy-Preserving MFS
    Chen, Guoming
    Chen, Qiang
    Zhu, Xiongyong
    Chen, Yiqun
    2018 7TH INTERNATIONAL CONFERENCE ON DIGITAL HOME (ICDH 2018), 2018, : 42 - 45
  • [44] Privacy-Preserving Approximate Top-k Nearest Keyword Queries over Encrypted Graphs
    Shen, Meng
    Wang, Minghui
    Xu, Ke
    Zhu, Liehuang
    2021 IEEE/ACM 29TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2021,
  • [45] Efficient and Privacy-Preserving Aggregate Query Over Public Property Graphs
    Guan, Yunguo
    Lu, Rongxing
    Zhang, Songnian
    Zheng, Yandong
    Shao, Jun
    Wei, Guiyi
    IEEE TRANSACTIONS ON BIG DATA, 2024, 10 (02) : 146 - 157
  • [46] Enabling efficient privacy-preserving subgraph isomorphic query over graphs
    Cong, Linhao
    Yu, Jia
    Ge, Xinrui
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 132 : 1 - 10
  • [47] Privacy-Preserving Similarity Joins Over Encrypted Data
    Yuan, Xingliang
    Wang, Xinyu
    Wang, Cong
    Yu, Chenyun
    Nutanong, Sarana
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) : 2763 - 2775
  • [48] Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data
    Fu, Zhangjie
    Huang, Fengxiao
    Ren, Kui
    Weng, Jian
    Wang, Cong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (08) : 1874 - 1884
  • [49] Towards efficient privacy-preserving conjunctive keywords search over encrypted cloud data
    Liu, Yaru
    Xiao, Xiaodong
    Kong, Fanyu
    Zhang, Hanlin
    Yu, Jia
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2025, 166
  • [50] Privacy-preserving and Efficient Multi-keyword Search Over Encrypted Data on Blockchain
    Jiang, Shan
    Cao, Jiannong
    McCannt, Julie A.
    Yang, Yanni
    Liu, Yang
    Wang, Xiaoqing
    Deng, Yuming
    2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2019), 2019, : 405 - 410