Privacy-assured Boolean Adjacent Vertex Search over Encrypted Graph Data in Cloud Computing

被引:0
|
作者
Zhu, Hong [1 ]
Wu, Bin [1 ]
Xie, Meiyi [1 ]
Cui, Zongmin [2 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan, Peoples R China
[2] Jiujiang Univ, Sch Informat Sci & Technol, Jiujiang, Peoples R China
关键词
encrypted graph; boolean expression; adjacent vertex search; cloud computing; searchable encryption; STRUCTURED DATA; MANAGEMENT; SCHEME; QUERY;
D O I
10.3837/tiis.2016.10.029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of cloud computing, many data owners outsource their graph data to the cloud for cost savings. The cloud server is not fully trusted and always wants to learn the owners' contents. To protect the information hiding, the graph data have to be encrypted before outsourcing to the cloud. The adjacent vertex search is a very common operation, many other operations can be built based on the adjacent vertex search. A boolean adjacent vertex search is an important basic operation, a query user can get the boolean search results. Due to the graph data being encrypted on the cloud server, a boolean adjacent vertex search is a quite difficult task. In this paper, we propose a solution to perform the boolean adjacent vertex search over encrypted graph data in cloud computing (BASG), which maintains the query tokens and search results privacy. We use the Gram-Schmidt algorithm and achieve the boolean expression search in our paper. We formally analyze the security of our scheme, and the query user can handily get the boolean search results by this scheme. The experiment results with a real graph data set demonstrate the efficiency of our scheme.
引用
收藏
页码:5171 / 5189
页数:19
相关论文
共 50 条
  • [21] Efficient Secure Privacy Preserving Multi Keywords Rank Search over Encrypted Data in Cloud Computing
    Ali, Muqadar
    He, Hongjie
    Hussain, Abid
    Hussain, Mehboob
    Yuan, Yuan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 75
  • [22] Privacy-Preserving Smart Similarity Search Based on Simhash over Encrypted Data in Cloud Computing
    Fu, Zhangjie
    Shu, Jiangang
    Wang, Jin
    Liu, Yuling
    Lee, Sungyoung
    JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (03): : 453 - 460
  • [23] Implementation of Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
    Shekokar, Narendra
    Sampat, Kunjita
    Chandawalla, Chandni
    Shah, Jahnavi
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 : 499 - 505
  • [24] Verifiable Ranked Search Over Dynamic Encrypted Data in Cloud Computing
    Liu, Qin
    Nie, Xiaohong
    Liu, Xuhui
    Peng, Tao
    Wu, Jie
    2017 IEEE/ACM 25TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2017,
  • [25] Authorized Private Keyword Search over Encrypted Data in Cloud Computing
    Li, Ming
    Yu, Shucheng
    Cao, Ning
    Lou, Wenjing
    31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, : 383 - 392
  • [26] Keyword Search with Access Control over Encrypted Data in Cloud Computing
    Shen, Zhirong
    Shu, Jiwu
    Xue, Wei
    2014 IEEE 22ND INTERNATIONAL SYMPOSIUM OF QUALITY OF SERVICE (IWQOS), 2014, : 87 - 92
  • [27] Privacy-Preserving Multi-Keyword Search over the Encrypted Data for Multiple Users in Cloud Computing
    Ranjan, Khirendra Alok
    Pasupulati, Syam Kumar
    Ramaligam, Subramanian
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS (ICICI 2017), 2017, : 1079 - 1084
  • [28] An Efficient Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Data in Cloud Computing
    Ahmad, Shadab
    Kurnar, Pasupuleti Syam
    2016 IEEE ANNUAL INDIA CONFERENCE (INDICON), 2016,
  • [29] Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data
    Liang, Kaitai
    Huang, Xinyi
    Guo, Fuchun
    Liu, Joseph K.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) : 2365 - 2376
  • [30] Verifiable dynamic ranked search with forward privacy over encrypted cloud data
    Chen, Chien-Ming
    Tie, Zhuoyu
    Wang, Eric Ke
    Khan, Muhammad Khurram
    Kumar, Sachin
    Kumari, Saru
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (05) : 2977 - 2991