Efficient and privacy-preserving butterfly counting on encrypted bipartite graphs

被引:0
|
作者
机构
[1] Pang, Xin
[2] 1,Chen, Lanxiang
基金
中国国家自然科学基金;
关键词
Ciphertext - Encryption algorithms;
D O I
10.1016/j.jisa.2024.103952
中图分类号
学科分类号
摘要
Bipartite graphs have numerous real-world applications, with the butterfly motif serving as a key higher-order structure that models cohesion within these graphs. Analyzing butterflies is crucial for a comprehensive understanding of networks, making butterfly counting a significant focus for researchers. In recent years, various efficient methods for exact butterfly counting, along with sampling-based approximate schemes, have been proposed for plaintext bipartite graphs. However, these methods often overlook data privacy concerns, which are critical in real-world scenarios such as doctor–patient and user–item relationships. Additionally, traditional encryption methods do not work due to the nature of graph structures. To tackle these challenges, we propose two schemes for exact butterfly counting on encrypted bipartite graphs (EB-BFC), enabling butterfly counting for specific vertices or edges to protect privacy of butterfly counting. Firstly, we demonstrate how structured encryption techniques could be used to encrypt the bipartite graph and construct a secure index, resulting in the efficient, privacy-preserving scheme EB-BFC1. Secondly, to ensure vertex data privacy, we propose a butterfly counting scheme based on Private Set Intersection, EB-BFC2. Finally, we demonstrate the security and efficiency of our proposed schemes through theoretical proofs and experiments on real-world datasets. © 2024 Elsevier Ltd
引用
下载
收藏
相关论文
共 50 条
  • [41] Encrypted Image Feature Extraction By Privacy-Preserving MFS
    Chen, Guoming
    Chen, Qiang
    Zhu, Xiongyong
    Chen, Yiqun
    2018 7TH INTERNATIONAL CONFERENCE ON DIGITAL HOME (ICDH 2018), 2018, : 42 - 45
  • [42] A Privacy-Preserving Infrastructure to Monitor Encrypted DNS Logs
    Abdel-Rahman, Adam Oumar
    Levillain, Olivier
    Totel, Eric
    RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2023, 2023, 14529 : 185 - 199
  • [43] Privacy-Preserving Approximate Top-k Nearest Keyword Queries over Encrypted Graphs
    Shen, Meng
    Wang, Minghui
    Xu, Ke
    Zhu, Liehuang
    2021 IEEE/ACM 29TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2021,
  • [44] Privacy-Preserving Similarity Joins Over Encrypted Data
    Yuan, Xingliang
    Wang, Xinyu
    Wang, Cong
    Yu, Chenyun
    Nutanong, Sarana
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) : 2763 - 2775
  • [45] Efficient and Privacy-Preserving Aggregate Query Over Public Property Graphs
    Guan, Yunguo
    Lu, Rongxing
    Zhang, Songnian
    Zheng, Yandong
    Shao, Jun
    Wei, Guiyi
    IEEE TRANSACTIONS ON BIG DATA, 2024, 10 (02) : 146 - 157
  • [46] Enabling efficient privacy-preserving subgraph isomorphic query over graphs
    Cong, Linhao
    Yu, Jia
    Ge, Xinrui
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 132 : 1 - 10
  • [47] Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data
    Fu, Zhangjie
    Huang, Fengxiao
    Ren, Kui
    Weng, Jian
    Wang, Cong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (08) : 1874 - 1884
  • [48] Privacy-preserving and Efficient Multi-keyword Search Over Encrypted Data on Blockchain
    Jiang, Shan
    Cao, Jiannong
    McCannt, Julie A.
    Yang, Yanni
    Liu, Yang
    Wang, Xiaoqing
    Deng, Yuming
    2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2019), 2019, : 405 - 410
  • [49] Achieve Efficient and Privacy-preserving Online Fingerprint Authentication over Encrypted Outsourced Data
    Wei, Qing
    Zhu, Hui
    Lu, Rongxing
    Li, Hui
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [50] Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Guan, Yunguo
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1090 - 1103