Constrained top-k nearest fuzzy keyword queries on encrypted graph in road network

被引:9
作者
Sun, Fangyuan [1 ,2 ]
Yu, Jia [1 ,2 ]
Ge, Xinrui [1 ]
Yang, Ming [3 ]
Kong, Fanyu [4 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Qilu Univ Technol, Shandong Prov Key Lab Comp Networks, Sch Cyber Secur, Shandong Comp Sci Ctr,Shandong Acad Sci, Jinan 250014, Peoples R China
[4] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy; Road network; Graph data; Shortest distance; Cloud computing; DISTANCE QUERIES; SEARCH;
D O I
10.1016/j.cose.2021.102456
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the gradual growth of road networks, the graphs used to represent road networks have been becoming larger and larger. It is a preferable choice for the user to outsource large-scale graphs for road networks to cloud and allow the cloud to store and query the information from graphs for him. It improves query efficiency greatly and reduces the user's burden remarkably. To protect the privacy of graph data, the user has to encrypt the graph before uploading it to the cloud. It makes performing query on the encrypted graph become a challenge. In this paper, we propose the first scheme for performing a constrained top -k nearest keyword query on an encrypted graph, even if a typo is made by the user. In the proposed scheme, we construct a new index structure based on the 2-hop cover label index to calculate the constrained shortest distance. In order to support fuzzy keyword query, we generate the fuzzy keyword set to build the keyword index in the graph. The security analysis shows the proposed scheme satisfies CQA-security and the experiments demonstrate the proposed scheme is efficient. (c) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 41 条
[1]  
Akiba Takuya, 2013, P 2013 ACM SIGMOD IN, DOI DOI 10.1145/2463676.2465315
[2]  
[Anonymous], 1980, Multiple Criteria Decision Making Theory and Application, DOI DOI 10.1007/978-3-642-48782-8_9
[3]  
Arnold B, 1972, VERKEHRSANNALEN, V19
[4]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[5]   Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing [J].
Cao, Ning ;
Yang, Zhenyu ;
Wang, Cong ;
Ren, Kui ;
Lou, Wenjing .
31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, :393-402
[6]   Structured Encryption and Controlled Disclosure [J].
Chase, Melissa ;
Kamara, Seny .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 :577-594
[7]   Reachability and distance queries via 2-hop labels [J].
Cohen, E ;
Halperin, E ;
Kaplan, H ;
Zwick, U .
SIAM JOURNAL ON COMPUTING, 2003, 32 (05) :1338-1355
[8]  
Cohen E., 2013, COSN, P131, DOI DOI 10.1145/2512938.2512944
[9]   Searchable symmetric encryption: Improved definitions and efficient constructions [J].
Curtmola, Reza ;
Garay, Juan ;
Kamara, Seny ;
Ostrovsky, Rafail .
JOURNAL OF COMPUTER SECURITY, 2011, 19 (05) :895-934
[10]  
Curtmola Reza, 2006, CCS, DOI DOI 10.1145/1180405.1180417