Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT

被引:23
|
作者
Tian, Youliang [1 ]
Zhang, Zhiying [1 ]
Xiong, Jinbo [2 ]
Chen, Lei [3 ]
Ma, Jianfeng [1 ,4 ]
Peng, Changgen [1 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[3] Georgia Southern Univ, Coll Engn & Comp, Statesboro, GA 30458 USA
[4] Xidian Univ, Sch Cyber Engn, Xian 710126, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2022年 / 9卷 / 04期
基金
中国国家自然科学基金;
关键词
Graph clustering; homomorphic encryption; privacy-preserving method; structural information; structure entropy; INTERNET; ALGORITHM; SECURITY; TRUST;
D O I
10.1109/JIOT.2021.3092185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Decoding the real structure from the Social Internet-of-Things (SIoT) network with a large-scale noise structure plays a fundamental role in data mining. Protecting private information from leakage in the mining process and obtaining accurate mining results is a significant challenge. To tackle this issue, we present a graph clustering privacy-preserving method based on structure entropy, which combines data mining with the structural information theory. Specially, user private information in SIoT is encrypted by Brakerski-Gentry-Vaikuntanathan (BGV) homomorphism to generate a graph structure in the ciphertext state, the ciphertext graph structure is then divided into different modules by applying a 2-D structural information solution algorithm and a entropy reduction principle node module partition algorithm, and the K-dimensional structural information solution algorithm is utilized to further cluster the internal nodes of the partition module. Moreover, normalized structural information and network node partition similarity are introduced to analyze the correctness and similarity degree of clustering results. Finally, security analysis and theoretical analysis indicate that this scheme not only guarantees the correctness of the clustering results but also improves the security of private information in SIoT. Experimental evaluation and analysis shows that the clustering results of this scheme have higher efficiency and reliability.
引用
收藏
页码:2761 / 2777
页数:17
相关论文
共 50 条
  • [21] Personalized Social Search Based on Agglomerative Hierarchical Graph Clustering
    Ishizuka, Kenkichi
    INFORMATION RETRIEVAL TECHNOLOGY (AIRS 2018), 2018, 11292 : 36 - 42
  • [22] An Improved Stochastic Fractal Search Based on Entropy Multitrust Fusion Model for IoT-Enabled WSNs Clustering
    Xu, Chaojie
    Su, Shengchao
    Wang, Yiwang
    IEEE SENSORS JOURNAL, 2023, 23 (23) : 29694 - 29704
  • [23] An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT
    Deebak, B. D.
    Al-Turjman, Fadi
    Aloqaily, Moayad
    Alfandi, Omar
    IEEE ACCESS, 2019, 7 : 135632 - 135649
  • [24] K-anonymity scheme for privacy preservation in location-based services on IoT environment
    Das, Ayan Kumar
    Tabassum, Ayesha
    Sadaf, Sayema
    Sinha, Ditipriya
    INTERNATIONAL JOURNAL OF AUTOMATION AND CONTROL, 2021, 15 (03) : 340 - 362
  • [25] A Double-Compensation-Based Federated Learning Scheme for Data Privacy Protection in a Social IoT Scenario
    Guo, Junqi
    Xiong, Qingyun
    Yang, Minghui
    Zhao, Ziyun
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 76 (01): : 827 - 848
  • [26] A security and privacy preserving approach based on social IoT and classification using DenseNet convolutional neural network
    Maniveena, C.
    Kalaiselvi, R.
    AUTOMATIKA, 2024, 65 (01) : 333 - 342
  • [27] Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems
    Shen, Shigen
    Wu, Xiaoping
    Sun, Panjun
    Zhou, Haiping
    Wu, Zongda
    Yu, Shui
    EXPERT SYSTEMS WITH APPLICATIONS, 2023, 225
  • [28] Analysis of stock market based on visibility graph and structure entropy
    Zhu, Jia
    Wei, Daijun
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2021, 576
  • [29] A privacy preservation data collection and access control using entropy-based conic curve
    Kumar, M. Venkatesh
    Lakshmi, C.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 44 (05) : 7629 - 7642
  • [30] Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions
    Ul Hassan, Muneeb
    Rehmani, Mubashir Husain
    Chen, Jinjun
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 97 : 512 - 529