TEE-Graph: efficient privacy and ownership protection for cloud-based graph spectral analysis

被引:0
|
作者
Alam, A. K. M. Mubashwir [1 ]
Chen, Keke [1 ]
机构
[1] Marquette Univ, TAIC Lab, Comp Sci, Milwaukee, WI 53233 USA
来源
FRONTIERS IN BIG DATA | 2023年 / 6卷
基金
美国国家科学基金会;
关键词
TEE; SGX; big graph; graph analytics; access pattern; ownership protection; FULLY HOMOMORPHIC ENCRYPTION;
D O I
10.3389/fdata.2023.1296469
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IntroductionBig graphs like social network user interactions and customer rating matrices require significant computing resources to maintain. Data owners are now using public cloud resources for storage and computing elasticity. However, existing solutions do not fully address the privacy and ownership protection needs of the key involved parties: data contributors and the data owner who collects data from contributors.MethodsWe propose a Trusted Execution Environment (TEE) based solution: TEE-Graph for graph spectral analysis of outsourced graphs in the cloud. TEEs are new CPU features that can enable much more efficient confidential computing solutions than traditional software-based cryptographic ones. Our approach has several unique contributions compared to existing confidential graph analysis approaches. (1) It utilizes the unique TEE properties to ensure contributors' new privacy needs, e.g., the right of revocation for shared data. (2) It implements efficient access-pattern protection with a differentially private data encoding method. And (3) it implements TEE-based special analysis algorithms: the Lanczos method and the Nystrom method for efficiently handling big graphs and protecting confidentiality from compromised cloud providers.ResultsThe TEE-Graph approach is much more efficient than software crypto approaches and also immune to access-pattern-based attacks. Compared with the best-known software crypto approach for graph spectral analysis, PrivateGraph, we have seen that TEE-Graph has 103-105 times lower computation, storage, and communication costs. Furthermore, the proposed access-pattern protection method incurs only about 10%-25% of the overall computation cost.DiscussionOur experimentation showed that TEE-Graph performs significantly better and has lower costs than typical software approaches. It also addresses the unique ownership and access-pattern issues that other TEE-related graph analytics approaches have not sufficiently studied. The proposed approach can be extended to other graph analytics problems with strong ownership and access-pattern protection.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Adaptive graph neural network protection algorithm based on differential privacy
    Yu, Junjie
    Li, Yong
    Liu, Zhandong
    Yang, Qianren
    JOURNAL OF SYSTEMS AND SOFTWARE, 2025, 225
  • [22] The design of graph-based privacy protection mechanisms for mobile systems
    Zhang, Zhong
    Yoon, Sungha
    Shin, Minho
    2019 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2019, : 55 - 60
  • [23] Semantic Location Privacy Protection Algorithm Based on Edge Cluster Graph
    Lu, Tao
    Xu, Hongyun
    Tian, Kai
    Tian, Cenxi
    Jiang, Rui
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1305 - 1310
  • [24] Cloud-based RFID mutual authentication scheme for efficient privacy preserving in IoV
    Fan, Kai
    Jiang, Wei
    Luo, Qi
    Li, Hui
    Yang, Yintang
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2021, 358 (01): : 193 - 209
  • [25] An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme
    Ou, Lu
    Yin, Hui
    Qin, Zheng
    Xiao, Sheng
    Yang, Guangyi
    Hu, Yupeng
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [26] Graph-PBN: Graph-based parallel branch network for efficient point cloud learning
    Zhang, Cheng
    Chen, Hao
    Wan, Haocheng
    Yang, Ping
    Wu, Zizhao
    GRAPHICAL MODELS, 2022, 119
  • [27] A graph anonymity-based privacy protection scheme for smart city scenarios
    Luo, Man
    Yan, Hairong
    2022 IEEE 6TH ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2022, : 489 - 492
  • [28] A privacy protection algorithm based on network Voronoi graph over road networks
    Pan, Xiao
    Wu, Lei
    Hu, Zhaojun
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (12): : 2750 - 2763
  • [29] Pri-PGD: Forging privacy-preserving graph towards spectral-based graph neural network
    Zeng, Yong
    Li, Yixin
    Liu, Jiale
    Ma, Jianfeng
    Liu, Zhihong
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [30] PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud
    Zheng, Yandong
    Zhu, Hui
    Lu, Rongxing
    Guan, Yunguo
    Zhang, Songnian
    Wang, Fengwei
    Shao, Jun
    Li, Hui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2030 - 2045