Privacy-preserving reachability query over graphs with result verifiability

被引:4
|
作者
Song, Yunjiao [1 ,2 ,3 ]
Ge, Xinrui
Yu, Jia [1 ,2 ,3 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[2] Beijing Univ Posts & Telecommun, State key Lab Networking & Switching Technol, Beijing 100878, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud security; Privacy preserving; Graph data; Reachability query; Social network; DISTANCE QUERIES; ENCRYPTED GRAPHS;
D O I
10.1016/j.cose.2023.103092
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Reachability query is one of the most popular and fundamental operations, which answers whether two given nodes are reachable in a graph. With the continuous increase of graph scale, data owners would like to upload graphs to the cloud server to enjoy the nice computing and storage service. How to realize privacy-preserving reachability query over graphs has become an important problem. Although there have already been some existed schemes for this problem, all of them only support the honest-but-curious model. If the cloud server returns the invalid query result, existing schemes will not work any longer. In this paper, we initiate the first study on realizing the verifiable privacy-preserving reachability query over graphs, and propose three step-by-step schemes based on the 2-hop labeling index and the MAC technology. The first proposed scheme can generate the verification tag for each pair of nodes in the index. But it leads to high communication and computation overhead. In order to address this problem, we propose the second scheme by constructing a special matrix to store the verification tag for each two nodes and their common nodes in the graph. It only returns one verification tag to the user, which requires less communication and computation overhead. Finally, we optimize the second scheme and propose the third scheme to further reduce the computation complexity. We make use of the symmetric-key primitives to secure the index, ensuring the necessary privacy with the ability of querying. The security analysis and extensive experiments show that our proposed schemes are secure and efficient.(c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] Achieving Efficient and Privacy-Preserving Reverse Skyline Query Over Single Cloud
    Peng, Yubo
    Li, Xiong
    Gu, Ke
    Chen, Jinjun
    Das, Sajal K.
    Zhang, Xiaosong
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2025, 37 (01) : 29 - 44
  • [32] Achieve privacy-preserving simplicial depth query over collaborative cloud servers
    Mahdikhani, Hassan
    Shahsavarifar, Rasoul
    Lu, Rongxing
    Bremner, David
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (01) : 412 - 423
  • [33] Efficient Privacy-Preserving Spatial Range Query Over Outsourced Encrypted Data
    Miao, Yinbin
    Yang, Yutao
    Li, Xinghua
    Liu, Zhiquan
    Li, Hongwei
    Choo, Kim-Kwang Raymond
    Deng, Robert H. H.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3921 - 3933
  • [34] The Reachability Query over Distributed Uncertain Graphs
    Cheng, Yurong
    Yuan, Ye
    Chen, Lei
    Wang, Guoren
    2015 IEEE 35TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, 2015, : 786 - 787
  • [35] Lightweight Privacy-Preserving Spatial Keyword Query over Encrypted Cloud Data
    Yang, Yutao
    Miao, Yinbin
    Choo, Kim-Kwang Raymond
    Deng, Robert H.
    2022 IEEE 42ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2022), 2022, : 392 - 402
  • [36] Privacy-Preserving Reverse Nearest Neighbor Query Over Encrypted Spatial Data
    Li, Xiaoguo
    Xiang, Tao
    Guo, Shangwei
    Li, Hongwei
    Mu, Yi
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (05) : 2954 - 2968
  • [37] PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Zhang, Songnian
    Guan, Yunguo
    Wang, Fengwei
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4387 - 4402
  • [38] Achieve privacy-preserving simplicial depth query over collaborative cloud servers
    Hassan Mahdikhani
    Rasoul Shahsavarifar
    Rongxing Lu
    David Bremner
    Peer-to-Peer Networking and Applications, 2020, 13 : 412 - 423
  • [39] Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data
    Zhang, Songnian
    Ray, Suprio
    Lu, Rongxing
    Guan, Yunguo
    Zheng, Yandong
    Shao, Jun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 3770 - 3786
  • [40] Functional privacy-preserving outsourcing scheme with computation verifiability in fog computing
    Tang, Wenyi
    Qin, Bo
    Li, Yanan
    Wu, Qianhong
    KSII Transactions on Internet and Information Systems, 2020, 14 (01) : 281 - 298