Privacy-preserving reachability query over graphs with result verifiability

被引:4
|
作者
Song, Yunjiao [1 ,2 ,3 ]
Ge, Xinrui
Yu, Jia [1 ,2 ,3 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[2] Beijing Univ Posts & Telecommun, State key Lab Networking & Switching Technol, Beijing 100878, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud security; Privacy preserving; Graph data; Reachability query; Social network; DISTANCE QUERIES; ENCRYPTED GRAPHS;
D O I
10.1016/j.cose.2023.103092
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Reachability query is one of the most popular and fundamental operations, which answers whether two given nodes are reachable in a graph. With the continuous increase of graph scale, data owners would like to upload graphs to the cloud server to enjoy the nice computing and storage service. How to realize privacy-preserving reachability query over graphs has become an important problem. Although there have already been some existed schemes for this problem, all of them only support the honest-but-curious model. If the cloud server returns the invalid query result, existing schemes will not work any longer. In this paper, we initiate the first study on realizing the verifiable privacy-preserving reachability query over graphs, and propose three step-by-step schemes based on the 2-hop labeling index and the MAC technology. The first proposed scheme can generate the verification tag for each pair of nodes in the index. But it leads to high communication and computation overhead. In order to address this problem, we propose the second scheme by constructing a special matrix to store the verification tag for each two nodes and their common nodes in the graph. It only returns one verification tag to the user, which requires less communication and computation overhead. Finally, we optimize the second scheme and propose the third scheme to further reduce the computation complexity. We make use of the symmetric-key primitives to secure the index, ensuring the necessary privacy with the ability of querying. The security analysis and extensive experiments show that our proposed schemes are secure and efficient.(c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] Achieve Efficient and Privacy-Preserving Compound Substring Query over Cloud
    Yin, Fan
    Lu, Rongxing
    Zheng, Yandong
    Tang, Xiaohu
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [22] A Privacy-Preserving Auction Platform with Public Verifiability for Smart Manufacturing
    Loruenser, Thomas
    Wohner, Florian
    Krenn, Stephan
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 637 - 647
  • [23] Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage
    Tong, Qiuyun
    Li, Xinghua
    Miao, Yinbin
    Wang, Yunwei
    Liu, Ximeng
    Deng, Robert H.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2746 - 2760
  • [24] Verifiable Strong Privacy-Preserving Any-Hop Reachability Query on Blockchain-Assisted Cloud
    Yu, Jingjuan
    Duan, Yuwei
    Luo, Ping
    Li, Shundong
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (24): : 39637 - 39650
  • [25] Privacy-preserving authentication of trees and graphs
    Kundu, Ashish
    Bertino, Elisa
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (06) : 467 - 494
  • [26] Privacy-preserving authentication of trees and graphs
    Ashish Kundu
    Elisa Bertino
    International Journal of Information Security, 2013, 12 : 467 - 494
  • [27] Efficient and Privacy-Preserving Edit Distance Query over Encrypted Genomic Data
    Zheng, Yandong
    Lu, Rongxing
    Shao, Jun
    Zhang, Yonggang
    Zhu, Hui
    2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,
  • [28] Privacy-preserving ranked neighbor query over encrypted graph data in the cloud
    Zhu, Hong
    Wu, Bin
    Xie, Meiyi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3167 - 3177
  • [29] Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data
    Samanthula, Bharath Kumar
    Jiang, Wei
    Bertino, Elisa
    COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 400 - 418
  • [30] An efficient privacy-preserving rank query over encrypted data in cloud computing
    Cheng, Fang-Quan
    Peng, Zhi-Yong
    Song, Wei
    Wang, Shu-Lin
    Cui, Yi-Hui
    Jisuanji Xuebao/Chinese Journal of Computers, 2012, 35 (11): : 2215 - 2227