Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT

被引:23
|
作者
Tian, Youliang [1 ]
Zhang, Zhiying [1 ]
Xiong, Jinbo [2 ]
Chen, Lei [3 ]
Ma, Jianfeng [1 ,4 ]
Peng, Changgen [1 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[3] Georgia Southern Univ, Coll Engn & Comp, Statesboro, GA 30458 USA
[4] Xidian Univ, Sch Cyber Engn, Xian 710126, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2022年 / 9卷 / 04期
基金
中国国家自然科学基金;
关键词
Graph clustering; homomorphic encryption; privacy-preserving method; structural information; structure entropy; INTERNET; ALGORITHM; SECURITY; TRUST;
D O I
10.1109/JIOT.2021.3092185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Decoding the real structure from the Social Internet-of-Things (SIoT) network with a large-scale noise structure plays a fundamental role in data mining. Protecting private information from leakage in the mining process and obtaining accurate mining results is a significant challenge. To tackle this issue, we present a graph clustering privacy-preserving method based on structure entropy, which combines data mining with the structural information theory. Specially, user private information in SIoT is encrypted by Brakerski-Gentry-Vaikuntanathan (BGV) homomorphism to generate a graph structure in the ciphertext state, the ciphertext graph structure is then divided into different modules by applying a 2-D structural information solution algorithm and a entropy reduction principle node module partition algorithm, and the K-dimensional structural information solution algorithm is utilized to further cluster the internal nodes of the partition module. Moreover, normalized structural information and network node partition similarity are introduced to analyze the correctness and similarity degree of clustering results. Finally, security analysis and theoretical analysis indicate that this scheme not only guarantees the correctness of the clustering results but also improves the security of private information in SIoT. Experimental evaluation and analysis shows that the clustering results of this scheme have higher efficiency and reliability.
引用
收藏
页码:2761 / 2777
页数:17
相关论文
共 50 条
  • [31] Effective Social Graph Deanonymization Based on Graph Structure and Descriptive Information
    Fu, Hao
    Zhang, Aston
    Xie, Xing
    ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2015, 6 (04)
  • [32] A Smartcard-Based User-Controlled Single Sign-On for Privacy Preservation in 5G-IoT Telemedicine Systems
    Lin, Tzu-Wei
    Hsu, Chien-Lung
    Le, Tuan-Vinh
    Lu, Chung-Fu
    Huang, Bo-Yu
    SENSORS, 2021, 21 (08)
  • [33] APRO: Secret Key Based Data Encryption and Mutual Authentication with Privacy Preservation Model in IoT Using Autoregressive Poor and Rich Optimization
    Palekar, Supriya
    Radhika, Y.
    CYBERNETICS AND SYSTEMS, 2024, 55 (04) : 823 - 847
  • [34] Entropy-Based Graph Clustering of PPI Networks for Predicting Overlapping Functional Modules of Proteins
    Jeong, Hoyeon
    Kim, Yoonbee
    Jung, Yi-Sue
    Kang, Dae Ryong
    Cho, Young-Rae
    ENTROPY, 2021, 23 (10)
  • [35] Conversational group detection based on social context using graph clustering algorithm
    Inaba, Shoichi
    Aoki, Yoshimitsu
    2016 12TH INTERNATIONAL CONFERENCE ON SIGNAL-IMAGE TECHNOLOGY & INTERNET-BASED SYSTEMS (SITIS), 2016, : 526 - 531
  • [36] An anonymous entropy-based location privacy protection scheme in mobile social networks
    Ni, Lina
    Tian, Fulong
    Ni, Qinghang
    Yan, Yan
    Zhang, Jinquan
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (1)
  • [37] Fractional cross entropy-based loss function for classification of IoT services with semantic graph based on IFTTT recipes
    Malik, Nikita
    Malik, Sanjay Kumar
    SIGNAL IMAGE AND VIDEO PROCESSING, 2024, 18 (SUPPL 1) : 71 - 86
  • [38] The Structure Entropy-Based Node Importance Ranking Method for Graph Data
    Liu, Shihu
    Gao, Haiyan
    ENTROPY, 2023, 25 (06)
  • [39] A Social Edge-Based IoT Framework Using Reputation-Based Clustering for Enhancing Competitiveness
    Fortino, Giancarlo
    Fotia, Lidia
    Messina, Fabrizio
    Rosaci, Domenico
    Sarne, Giuseppe M. L.
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2023, 10 (04) : 2051 - 2060
  • [40] RcDT: Privacy Preservation Based on R-Constrained Dummy Trajectory in Mobile Social Networks
    Zhang, Jinquan
    Wang, Xiao
    Yuan, Yanfeng
    Ni, Lina
    IEEE ACCESS, 2019, 7 : 90476 - 90486