A Privacy-Preserving Framework for Subgraph Pattern Matching in Cloud

被引:3
|
作者
Gao, Jiuru [1 ]
Xu, Jiajie [1 ]
Liu, Guanfeng [1 ]
Chen, Wei [1 ]
Yin, Hongzhi [2 ]
Zhao, Lei [1 ]
机构
[1] Soochow Univ, Sch Comp Sci & Technol, Suzhou, Peoples R China
[2] Univ Queensland, Sch Informat Technol & Elect Engn, Brisbane, Qld, Australia
基金
中国国家自然科学基金;
关键词
Privacy-preserving; Subgraph pattern matching; Strong simulation; k-automorphism; Label generalization; GRAPH; NETWORK;
D O I
10.1007/978-3-319-91452-7_20
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The growing popularity of storing large data graphs in cloud has inspired the emergence of subgraph pattern matching on a remote cloud, which is usually defined in terms of subgraph isomorphism. However, it is an NP-complete problem and too strict to find useful matches in certain applications. In addition, there exists another important concern, i.e., how to protect the privacy of data graphs in subgraph pattern matching without undermining matching results. To tackle these problems, we propose a novel framework to achieve the privacy-preserving subgraph pattern matching via strong simulation in cloud. Firstly, we develop a k-automorphism model based method to protect structural privacy in data graphs. Additionally, we use a cost-model based label generalization method to protect label privacy in both data graphs and pattern graphs. Owing to the symmetry in a k-automorphic graph, the subgraph pattern matching can be answered using the outsourced graph, which is only a subset of a k-automorphic graph. The efficiency of subgraph pattern matching can be greatly improved by this way. Extensive experiments on real-world datasets demonstrate the high efficiency and effectiveness of our framework.
引用
收藏
页码:307 / 322
页数:16
相关论文
共 50 条
  • [31] A cloud-based framework for verifiable privacy-preserving spectrum auction
    Li, Ruinian
    Song, Tianyi
    Mei, Bo
    Hu, Chunqiang
    Li, Wei
    Larson, Maya
    Cheng, Xiuzhen
    Bie, Rongfang
    [J]. HIGH-CONFIDENCE COMPUTING, 2022, 2 (01):
  • [32] Enhancing privacy-preserving mechanisms in Cloud storage: A novel conceptual framework
    Mishra, Alok
    Jabar, Thr Satar
    Alzoubi, Yehia Ibrahim
    Mishra, Kamta Nath
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (26):
  • [33] CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing
    Hoerandner, Felix
    Krenn, Stephan
    Migliavacca, Andrea
    Thiemer, Florian
    Zwattendorfer, Bernd
    [J]. PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 742 - 749
  • [34] Privacy-Preserving Credit Scoring on Cloud
    Wang, Jilin
    Chen, Yingzi
    Feng, Xiaoqing
    [J]. CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 195 - 205
  • [35] Privacy-preserving Image Processing in the Cloud
    Qin, Zhan
    Weng, Jian
    Cui, Yong
    Ren, Kui
    [J]. IEEE CLOUD COMPUTING, 2018, 5 (02): : 48 - 57
  • [36] A Cloud Aided Privacy-Preserving Profile Matching Scheme In Mobile Social Networks
    Cheng, Qiong
    Gao, Chong-zhi
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, : 195 - 198
  • [37] Privacy-preserving frequent pattern sharing
    Wang, Zhihui
    Wang, Wei
    Shi, Baile
    Boey, S. H.
    [J]. ADVANCES IN DATABASES: CONCEPTS, SYSTEMS AND APPLICATIONS, 2007, 4443 : 225 - +
  • [38] Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting
    Kerschbaum, Florian
    Oertel, Nina
    [J]. RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 124 - 137
  • [39] PVOPM: Verifiable Privacy-Preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting
    Zhou, Jun
    Choo, Kim-Kwang Raymond
    Cao, Zhenfu
    Dong, Xiaolei
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (05) : 2253 - 2270
  • [40] Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption
    Yasuda, Masaya
    Shimoyama, Takeshi
    Kogure, Jun
    Yokoyama, Kazuhiro
    Koshiba, Takeshi
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 338 - 353