Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT

被引:23
|
作者
Tian, Youliang [1 ]
Zhang, Zhiying [1 ]
Xiong, Jinbo [2 ]
Chen, Lei [3 ]
Ma, Jianfeng [1 ,4 ]
Peng, Changgen [1 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[3] Georgia Southern Univ, Coll Engn & Comp, Statesboro, GA 30458 USA
[4] Xidian Univ, Sch Cyber Engn, Xian 710126, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2022年 / 9卷 / 04期
基金
中国国家自然科学基金;
关键词
Graph clustering; homomorphic encryption; privacy-preserving method; structural information; structure entropy; INTERNET; ALGORITHM; SECURITY; TRUST;
D O I
10.1109/JIOT.2021.3092185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Decoding the real structure from the Social Internet-of-Things (SIoT) network with a large-scale noise structure plays a fundamental role in data mining. Protecting private information from leakage in the mining process and obtaining accurate mining results is a significant challenge. To tackle this issue, we present a graph clustering privacy-preserving method based on structure entropy, which combines data mining with the structural information theory. Specially, user private information in SIoT is encrypted by Brakerski-Gentry-Vaikuntanathan (BGV) homomorphism to generate a graph structure in the ciphertext state, the ciphertext graph structure is then divided into different modules by applying a 2-D structural information solution algorithm and a entropy reduction principle node module partition algorithm, and the K-dimensional structural information solution algorithm is utilized to further cluster the internal nodes of the partition module. Moreover, normalized structural information and network node partition similarity are introduced to analyze the correctness and similarity degree of clustering results. Finally, security analysis and theoretical analysis indicate that this scheme not only guarantees the correctness of the clustering results but also improves the security of private information in SIoT. Experimental evaluation and analysis shows that the clustering results of this scheme have higher efficiency and reliability.
引用
收藏
页码:2761 / 2777
页数:17
相关论文
共 50 条
  • [41] An approach based on mixed hierarchical clustering and optimization for graph analysis in social media network: toward globally hierarchical community structure
    Toujani, Radhia
    Akaichi, Jalel
    KNOWLEDGE AND INFORMATION SYSTEMS, 2019, 60 (02) : 907 - 947
  • [42] An Uncertain Graph Method Based on Node Random Response to Preserve Link Privacy of Social Networks
    Yan, Jun
    Chen, Jiawang
    Zhou, Yihui
    Wu, Zhenqiang
    Lu, Laifeng
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2024, 18 (01): : 147 - 169
  • [43] Effective communication data transmission based on community clustering in opportunistic social networks in IoT system
    Zhang, Xiangxiang
    Chang, Liu
    Luo, Jingwen
    Wu, Jia
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2021, 41 (01) : 2129 - 2144
  • [44] Two level blockchain-based privacy preservation framework in IoT with heuristic fusion mechanism-aided deep learning architecture
    Ahamad, Danish
    Hameed, Shabi Alam
    INTERNET OF THINGS, 2023, 24
  • [45] A Security and Privacy-Preserving Approach Based on Data Disturbance for Collaborative Edge Computing in Social IoT Systems
    Zhang, Peiying
    Wang, Yaqi
    Kumar, Neeraj
    Jiang, Chunxiao
    Shi, Guowei
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 9 (01) : 97 - 108
  • [46] IoT based cyber forensics in big data optimization and privacy using deep neural anomaly detection with Hadoop clustering and convolution based Adam optimizer
    Venugopal, Sabaresan
    Rengaswamy, Ramesh
    Sathianesan, Godfrey Winster
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (11)
  • [47] GLEAM: a graph clustering framework based on potential game optimization for large-scale social networks
    Zhan Bu
    Jie Cao
    Hui-Jia Li
    Guangliang Gao
    Haicheng Tao
    Knowledge and Information Systems, 2018, 55 : 741 - 770
  • [48] GLEAM: a graph clustering framework based on potential game optimization for large-scale social networks
    Bu, Zhan
    Cao, Jie
    Li, Hui-Jia
    Gao, Guangliang
    Tao, Haicheng
    KNOWLEDGE AND INFORMATION SYSTEMS, 2018, 55 (03) : 741 - 770
  • [49] Federated Learning-Based Lightweight Two-Factor Authentication Framework with Privacy Preservation for Mobile Sink in the Social IoMT
    Deebak, B. D.
    Hwang, Seong Oun
    ELECTRONICS, 2023, 12 (05)
  • [50] 3-D-SIS: A 3-D-Social Identifier Structure for Collaborative Edge Computing Based Social IoT
    Ibrar, Muhammad
    Wang, Lei
    Akbar, Aamir
    Jan, Mian Ahmad
    Shah, Nadir
    Abid, Shahbaz Akhtar
    Segal, Michael
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 9 (01) : 313 - 323