Enabling Privacy-Preserving K-Hop Reachability Query Over Encrypted Graphs

被引:0
|
作者
Song, Yunjiao [1 ,2 ]
Ge, Xinrui [1 ]
Yu, Jia [1 ,2 ]
Hao, Rong [1 ]
Yang, Ming [3 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710071, Peoples R China
[3] Shandong Acad Sci, Coll Qilu Univ Technol, Shandong Comp Sci Ctr, Shandong Prov Key Lab Comp Networks, Jinan 250000, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Indexes; Servers; Cloud computing; Privacy; Encryption; Computer science; graph privacy; K-hop reachability query; privacy preserving;
D O I
10.1109/TSC.2024.3382954
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
K-hop Reachability Query (KRQ) is one of fundamental graph queries, which can answer whether a node u can reach a node v within K hops. With the scale of graph data increasing, data owner desires to outsource the local graphs to cloud server. To protect the graph privacy, data owner encrypts graphs before outsourcing them to the cloud server. It imposes a great challenge to KRQ over encrypted graphs. How to realize Privacy-Preserving K-hop Reachability Query (PPKRQ) over encrypted graphs is still an unexplored problem. In this article, we explore this problem and propose a practical scheme. In order to efficiently answer KRQ over encrypted graphs, we construct the encrypted Breadth-First Spanning Tree table and adjacent list D (BFST-D). Based on encrypted BFST table, we can directly judge whether two query nodes are reachable within K hops when they are in one spanning tree. The encrypted adjacent list D can help answer that two query nodes in different spanning trees. To protect the privacy, we utilize the Paillier cryptographic and Order-Revealing Encryption (ORE) to support the comparison and computation over ciphertexts. As a result, our scheme achieves the sensitive information privacy without losing the ability of querying over encrypted graphs. The security analysis shows that our proposed scheme is secure based on semi-honest cloud server. The extensive experiments show the efficiency of our scheme.
引用
收藏
页码:893 / 904
页数:12
相关论文
共 50 条
  • [1] Privacy-preserving reachability query over graphs with result verifiability
    Song, Yunjiao
    Ge, Xinrui
    Yu, Jia
    [J]. COMPUTERS & SECURITY, 2023, 127
  • [2] Privacy-Preserving Reachability Query Services for Sparse Graphs
    Yi, Peipei
    Fan, Zhe
    Yin, Shuxiang
    [J]. 2014 IEEE 30TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOPS (ICDEW), 2014, : 32 - 35
  • [3] Enabling efficient privacy-preserving subgraph isomorphic query over graphs
    Cong, Linhao
    Yu, Jia
    Ge, Xinrui
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 132 : 1 - 10
  • [4] Privacy-Preserving Reachability Query Services
    Yin, Shuxiang
    Fan, Zhe
    Yi, Peipei
    Choi, Byron
    Xu, Jianliang
    Zhou, Shuigeng
    [J]. DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2014, PT I, 2014, 8421 : 203 - 219
  • [5] Privacy-preserving query over the encrypted image in cloud computing
    [J]. Zhu, X. (zhudongxu@vip.sina.com), 1600, Science Press (41):
  • [6] Efficient and Privacy-Preserving Eclipse Query over Encrypted Data
    Song, Weiyu
    Zhang, Yonggang
    Sun, Lili
    Zheng, Yandong
    Lu, Rongxing
    [J]. IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 1 - 6
  • [7] Privacy-preserving local clustering coefficient query on structured encrypted graphs
    Pan, Yingying
    Chen, Lanxiang
    Chen, Gaolin
    [J]. Computer Networks, 2024, 255
  • [8] An Efficient and Privacy-Preserving Range Query over Encrypted Cloud Data
    Wang, Wentao
    Jin, Yuxuan
    Cao, Bin
    [J]. 2022 19TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY & TRUST (PST), 2022,
  • [9] Enabling Comparable Search Over Encrypted Data for IoT with Privacy-Preserving
    Xu, Lei
    Xu, Chungen
    Liu, Zhongyi
    Wang, Yunling
    Wang, Jianfeng
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 60 (02): : 675 - 690
  • [10] Privacy-Preserving Approximate Top-k Nearest Keyword Queries over Encrypted Graphs
    Shen, Meng
    Wang, Minghui
    Xu, Ke
    Zhu, Liehuang
    [J]. 2021 IEEE/ACM 29TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2021,