PGAS: Privacy-preserving graph encryption for accurate constrained shortest distance queries

被引:42
作者
Zhang, Can [1 ]
Zhu, Liehuang [1 ]
Xu, Chang [1 ]
Sharif, Kashif [1 ]
Zhang, Chuan [1 ]
Liu, Ximeng [2 ,3 ,4 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing, Peoples R China
[2] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou, Fujian, Peoples R China
[3] Fujian Prov Key Lab Informat Secur Network Syst, Fuzhou, Fujian, Peoples R China
[4] Singapore Management Univ, Sch Informat Syst, Singapore, Singapore
基金
中国国家自然科学基金;
关键词
Cloud computing; Graph encryption; Constrained shortest distance query; Outsourced computing; FULLY HOMOMORPHIC ENCRYPTION; SEARCHABLE ENCRYPTION; EFFICIENT;
D O I
10.1016/j.ins.2019.07.082
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The constrained shortest distance (CSD) query is used to determine the shortest distance between two vertices of a graph while ensuring that the total cost remains lower than a given threshold. The virtually unlimited storage and processing capabilities of cloud computing have enabled the graph owners to outsource their graph data to cloud servers. However, it may introduce privacy challenges that are difficult to address. In recent years, some relevant schemes that support the shortest distance query on the encrypted graph have been proposed. Unfortunately, some of them have unacceptable query accuracy, and some of them leak sensitive information that jeopardizes the graph privacy. In this work, we propose Privacy-preserving Graph encryption for Accurate constrained Shortest distance queries, called PGAS. This solution is capable of providing accurate CSD queries and ensures the privacy of the graph data. Besides, we also propose a secure integer comparison protocol and a secure minimum value protocol that realize two kinds of operations on encrypted integers. We provide theoretical security analysis to prove that PGAS achieves CQA-2 Security with less privacy leakage. In addition, the performance analysis and experimental evaluation based on real-world dataset show that PGAS achieves 100% accuracy with acceptable efficiency. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:325 / 345
页数:21
相关论文
共 45 条
[1]  
Akiba T., 2013, P ACM SIGMOD INT C M, P349, DOI DOI 10.1145/2463676.2465315
[2]  
[Anonymous], P 22 INT C AUT PLANN
[3]   The shortest-path problem with resource constraints with (k, 2)-loop elimination and its application to the capacitated arc-routing problem [J].
Bode, Claudia ;
Irnich, Stefan .
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2014, 238 (02) :415-426
[4]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[5]   Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing [J].
Cao, Ning ;
Yang, Zhenyu ;
Wang, Cong ;
Ren, Kui ;
Lou, Wenjing .
31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, :393-402
[6]   Structured Encryption and Controlled Disclosure [J].
Chase, Melissa ;
Kamara, Seny .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 :577-594
[7]  
Cramer R, 2002, LECT NOTES COMPUT SC, V2332, P45
[8]   Searchable symmetric encryption: Improved definitions and efficient constructions [J].
Curtmola, Reza ;
Garay, Juan ;
Kamara, Seny ;
Ostrovsky, Rafail .
JOURNAL OF COMPUTER SECURITY, 2011, 19 (05) :895-934
[9]  
Gal, 1980, LECTURE NOTES EC MAT, P109, DOI [10.1007/978-3-642-48782-8_9, DOI 10.1007/978-3-642-48782-8_9]
[10]  
Gentry C, 2013, LECT NOTES COMPUT SC, V8042, P75, DOI 10.1007/978-3-642-40041-4_5