Privacy-preserving local clustering coefficient query on structured encrypted graphs

被引:1
|
作者
Pan, Yingying [1 ]
Chen, Lanxiang [1 ,2 ]
Chen, Gaolin [1 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
[2] City Univ Macau, Fac Data Sci, Macau 999078, Peoples R China
基金
中国国家自然科学基金;
关键词
Local clustering coefficient; Structured encryption; Graph encryption; PSI; Encrypted graph analysis;
D O I
10.1016/j.comnet.2024.110895
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Graphs and graph databases serve as the fundamental building blocks for various network structures. In real- world network scenarios, nodes often aggregate due to their approximate organizational associations with each other. The local clustering coefficient, which evaluates the proximity of nodes within a graph, plays an important role in quantifying the structural properties of graphs in scrutinizing network robustness and understanding its intricate dynamics. Despite the growing popularity of easily accessible cloud services among small and medium-sized enterprises as well as individuals, the potential risk of data privacy disclosure when outsourcing large graphs to third-party servers is increasing. It is vital to explore a technique for executing queries on encrypted graph data. In this paper, we propose a structured encryption scheme to achieve privacy- preserving local clustering coefficient query ( STE-CC ) on the outsourced encrypted graphs. To calculate the clustering coefficient, we design the PSI sum protocol to sum the number of intersections, in which the basic private set intersection (PSI) protocol combines Bloom filter (BF) and garbled Bloom filter (GBF) to perform the private matching for counting the number of common neighbors. When configured with appropriate parameters, it can achieve no false negatives and negligible false positives. Finally, the security analysis and experimental evaluation on real-world graph data substantiate the effectiveness and efficiency of our approach.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Privacy-preserving queries on encrypted data
    Yang, Zhiqiang
    Zhong, Sheng
    Wright, Rebecca N.
    Computer Security - ESORICS 2006, Proceedings, 2006, 4189 : 479 - 495
  • [22] Efficient and Privacy-Preserving Aggregate Query Over Public Property Graphs
    Guan, Yunguo
    Lu, Rongxing
    Zhang, Songnian
    Zheng, Yandong
    Shao, Jun
    Wei, Guiyi
    IEEE TRANSACTIONS ON BIG DATA, 2024, 10 (02) : 146 - 157
  • [23] Enabling efficient privacy-preserving subgraph isomorphic query over graphs
    Cong, Linhao
    Yu, Jia
    Ge, Xinrui
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 132 : 1 - 10
  • [24] Privacy-preserving mechanism for mixed data clustering with local differential privacy
    Yuan, Liujie
    Zhang, Shaobo
    Zhu, Gengming
    Alinani, Karim
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (19):
  • [25] PeGraph: A System for Privacy-Preserving and Efficient Search Over Encrypted Social Graphs
    Wang, Songlei
    Zheng, Yifeng
    Jia, Xiaohua
    Yi, Xun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3179 - 3194
  • [26] A Local Differential Privacy Based Privacy-Preserving Grid Clustering Method
    Zhang D.-Y.
    Ni W.-W.
    Zhang S.
    Fu N.
    Hou L.-H.
    Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (02): : 422 - 435
  • [27] EPSet: Efficient and Privacy-Preserving Set Similarity Range Query Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Guan, Yunguo
    Zhang, Songnian
    Shao, Jun
    Wang, Fengwei
    Zhu, Hui
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (02) : 524 - 536
  • [28] PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud
    Zheng, Yandong
    Zhu, Hui
    Lu, Rongxing
    Guan, Yunguo
    Zhang, Songnian
    Wang, Fengwei
    Shao, Jun
    Li, Hui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2030 - 2045
  • [29] Query Integrity Meets Blockchain: A Privacy-Preserving Verification Framework for Outsourced Encrypted Data
    Jiang, Shunrong
    Liu, Jianqing
    Chen, Jingwei
    Liu, Yiliang
    Wang, Liangmin
    Zhou, Yong
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (03) : 2100 - 2113
  • [30] Efficient and Privacy-Preserving Similarity Range Query Over Encrypted Time Series Data
    Zheng, Yandong
    Lu, Rongxing
    Guan, Yunguo
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2501 - 2516