Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT

被引:23
|
作者
Tian, Youliang [1 ]
Zhang, Zhiying [1 ]
Xiong, Jinbo [2 ]
Chen, Lei [3 ]
Ma, Jianfeng [1 ,4 ]
Peng, Changgen [1 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[3] Georgia Southern Univ, Coll Engn & Comp, Statesboro, GA 30458 USA
[4] Xidian Univ, Sch Cyber Engn, Xian 710126, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2022年 / 9卷 / 04期
基金
中国国家自然科学基金;
关键词
Graph clustering; homomorphic encryption; privacy-preserving method; structural information; structure entropy; INTERNET; ALGORITHM; SECURITY; TRUST;
D O I
10.1109/JIOT.2021.3092185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Decoding the real structure from the Social Internet-of-Things (SIoT) network with a large-scale noise structure plays a fundamental role in data mining. Protecting private information from leakage in the mining process and obtaining accurate mining results is a significant challenge. To tackle this issue, we present a graph clustering privacy-preserving method based on structure entropy, which combines data mining with the structural information theory. Specially, user private information in SIoT is encrypted by Brakerski-Gentry-Vaikuntanathan (BGV) homomorphism to generate a graph structure in the ciphertext state, the ciphertext graph structure is then divided into different modules by applying a 2-D structural information solution algorithm and a entropy reduction principle node module partition algorithm, and the K-dimensional structural information solution algorithm is utilized to further cluster the internal nodes of the partition module. Moreover, normalized structural information and network node partition similarity are introduced to analyze the correctness and similarity degree of clustering results. Finally, security analysis and theoretical analysis indicate that this scheme not only guarantees the correctness of the clustering results but also improves the security of private information in SIoT. Experimental evaluation and analysis shows that the clustering results of this scheme have higher efficiency and reliability.
引用
收藏
页码:2761 / 2777
页数:17
相关论文
共 50 条
  • [21] Achieving Lightweight Privacy-Preserving Image Sharing and Illegal Distributor Detection in Social IoT
    Deng, Tianpeng
    Li, Xuan
    Jin, Biao
    Chen, Lei
    Lin, Jie
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [22] Blockchain-Based Privacy Preservation for IoT-Enabled Healthcare System
    Sharma, Pratima
    Namasudra, Suyel
    Chilamkurti, Naveen
    Kim, Byung-Gyu
    Crespo, Ruben Gonzalez
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2023, 19 (03)
  • [23] ε-k anonymization and adversarial training of graph neural networks for privacy preservation in social networks
    Tian, Hu
    Zheng, Xiaolong
    Zhang, Xingwei
    Zeng, Daniel Dajun
    ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2021, 50
  • [24] An efficient graph community clustering and ranking-based cryptographic privacy preserving framework on large social databases
    Shamila, M.
    Rekha, G.
    Reddy, K. Vinuthna
    COGENT ENGINEERING, 2024, 11 (01):
  • [25] User Motivation Based Privacy Preservation in Location Based Social Networks
    Sai, Akshita Maradapu Vera Venkata
    Zhang, Kainan
    Li, Yingshu
    2021 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, INTERNET OF PEOPLE, AND SMART CITY INNOVATIONS (SMARTWORLD/SCALCOM/UIC/ATC/IOP/SCI 2021), 2021, : 471 - 478
  • [26] Efficient Multi-View Graph Clustering with Local and Global Structure Preservation
    Wen, Yi
    Liu, Suyuan
    Wan, Xinhang
    Wang, Siwei
    Liang, Ke
    Liu, Xinwang
    Yang, Xihong
    Zhang, Pei
    PROCEEDINGS OF THE 31ST ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, MM 2023, 2023, : 3021 - 3030
  • [27] D-GSPerturb: A distributed social privacy protection algorithm based on graph structure perturbation
    Zhang X.-L.
    Zhang W.-C.
    Zhang C.
    Liu L.-X.
    He X.-Y.
    Zhang, Xiao-Lin (zhangxl@imust.cn), 2017, Computer Society of the Republic of China (28) : 51 - 61
  • [28] Privacy Preservation based on Rotation Perturbation in Weighted Social Networks
    Li, Furong
    Zhang, Ru
    Xu, Yi
    Liu, Jianyi
    Li, Juan
    2016 16TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES (ISCIT), 2016, : 206 - 209
  • [29] Attribute privacy preservation in social networks based on node anatomy
    Fu, Yan-Yan
    Zhang, Min
    Feng, Deng-Guo
    Chen, Kai-Qu
    Ruan Jian Xue Bao/Journal of Software, 2014, 25 (04): : 768 - 780
  • [30] Privacy Preservation in Online Social Networks Using Multiple-Graph-Properties-Based Clustering to Ensure k-Anonymity, l-Diversity, and t-Closeness
    Gangarde, Rupali
    Sharma, Amit
    Pawar, Ambika
    Joshi, Rahul
    Gonge, Sudhanshu
    ELECTRONICS, 2021, 10 (22)