Privacy-preserving reachability query over graphs with result verifiability

被引:4
|
作者
Song, Yunjiao [1 ,2 ,3 ]
Ge, Xinrui
Yu, Jia [1 ,2 ,3 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[2] Beijing Univ Posts & Telecommun, State key Lab Networking & Switching Technol, Beijing 100878, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud security; Privacy preserving; Graph data; Reachability query; Social network; DISTANCE QUERIES; ENCRYPTED GRAPHS;
D O I
10.1016/j.cose.2023.103092
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Reachability query is one of the most popular and fundamental operations, which answers whether two given nodes are reachable in a graph. With the continuous increase of graph scale, data owners would like to upload graphs to the cloud server to enjoy the nice computing and storage service. How to realize privacy-preserving reachability query over graphs has become an important problem. Although there have already been some existed schemes for this problem, all of them only support the honest-but-curious model. If the cloud server returns the invalid query result, existing schemes will not work any longer. In this paper, we initiate the first study on realizing the verifiable privacy-preserving reachability query over graphs, and propose three step-by-step schemes based on the 2-hop labeling index and the MAC technology. The first proposed scheme can generate the verification tag for each pair of nodes in the index. But it leads to high communication and computation overhead. In order to address this problem, we propose the second scheme by constructing a special matrix to store the verification tag for each two nodes and their common nodes in the graph. It only returns one verification tag to the user, which requires less communication and computation overhead. Finally, we optimize the second scheme and propose the third scheme to further reduce the computation complexity. We make use of the symmetric-key primitives to secure the index, ensuring the necessary privacy with the ability of querying. The security analysis and extensive experiments show that our proposed schemes are secure and efficient.(c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Privacy-Preserving Reachability Query Services for Sparse Graphs
    Yi, Peipei
    Fan, Zhe
    Yin, Shuxiang
    2014 IEEE 30TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOPS (ICDEW), 2014, : 32 - 35
  • [2] Enabling Privacy-Preserving K-Hop Reachability Query Over Encrypted Graphs
    Song, Yunjiao
    Ge, Xinrui
    Yu, Jia
    Hao, Rong
    Yang, Ming
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (03) : 893 - 904
  • [3] Privacy-Preserving Reachability Query Services
    Yin, Shuxiang
    Fan, Zhe
    Yi, Peipei
    Choi, Byron
    Xu, Jianliang
    Zhou, Shuigeng
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2014, PT I, 2014, 8421 : 203 - 219
  • [4] Privacy-Preserving Reachability Query Services for Massive Networks
    Jiang, Jiaxin
    Yi, Peipei
    Choi, Byron
    Zhang, Zhiwei
    Yu, Xiaohui
    CIKM'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2016, : 145 - 154
  • [5] Efficient and Privacy-Preserving Aggregate Query Over Public Property Graphs
    Guan, Yunguo
    Lu, Rongxing
    Zhang, Songnian
    Zheng, Yandong
    Shao, Jun
    Wei, Guiyi
    IEEE TRANSACTIONS ON BIG DATA, 2024, 10 (02) : 146 - 157
  • [6] Enabling efficient privacy-preserving subgraph isomorphic query over graphs
    Cong, Linhao
    Yu, Jia
    Ge, Xinrui
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 132 : 1 - 10
  • [7] Privacy-preserving Boolean range query with verifiability and forward security over spatio-textual data
    Ge, Xinrui
    Yu, Jia
    Kong, Fanyu
    INFORMATION SCIENCES, 2024, 677
  • [8] Achieving Efficient and Privacy-Preserving (α, β)-Core Query Over Bipartite Graphs in Cloud
    Guan, Yunguo
    Lu, Rongxing
    Zheng, Yandong
    Zhang, Songnian
    Shao, Jun
    Wei, Guiyi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 1979 - 1993
  • [9] PPFLV: privacy-preserving federated learning with verifiability
    Zhou, Qun
    Shen, Wenting
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (09): : 12727 - 12743
  • [10] Privacy-preserving local clustering coefficient query on structured encrypted graphs
    Pan, Yingying
    Chen, Lanxiang
    Chen, Gaolin
    COMPUTER NETWORKS, 2024, 255