Back to Search Start Over

Achieving Efficient and Privacy-Preserving (<inline-formula><tex-math notation="LaTeX">$\alpha,\beta$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>α</mml:mi><mml:mo>,</mml:mo><mml:mi>β</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href="lu-ieq1-3169386.gif"/></alternatives></inline-formula>)-Core Query Over Bipartite Graphs in Cloud

Authors :
Guan, Yunguo
Lu, Rongxing
Zheng, Yandong
Zhang, Songnian
Shao, Jun
Wei, Guiyi
Source :
IEEE Transactions on Dependable and Secure Computing; 2023, Vol. 20 Issue: 3 p1979-1993, 15p
Publication Year :
2023

Abstract

Bipartite graphs have been widely adopted in applications such as e-healthcare and recommendation systems thanks to their ability to model various real-world relationships. Meanwhile, &lt;inline-formula&gt;&lt;tex-math notation=&quot;LaTeX&quot;&gt;$(\alpha,\beta)$&lt;/tex-math&gt;&lt;alternatives&gt;&lt;mml:math&gt;&lt;mml:mrow&gt;&lt;mml:mo&gt;(&lt;/mml:mo&gt;&lt;mml:mi&gt;α&lt;/mml:mi&gt;&lt;mml:mo&gt;,&lt;/mml:mo&gt;&lt;mml:mi&gt;β&lt;/mml:mi&gt;&lt;mml:mo&gt;)&lt;/mml:mo&gt;&lt;/mml:mrow&gt;&lt;/mml:math&gt;&lt;inline-graphic xlink:href=&quot;lu-ieq2-3169386.gif&quot;/&gt;&lt;/alternatives&gt;&lt;/inline-formula&gt;-core query services over bipartite graphs are generally recognized as a promising approach for finding communities, i.e., sets of closely related vertices, in a bipartite graph. As the bipartite graph grows, the service providers tend to outsource the services to the cloud for flexible and highly reliable computational resources. However, since the cloud is not fully trustable, there are privacy concerns related to the dataset, query requests, and results. Although many schemes have been proposed for privacy-preserving queries over graphs, they cannot be directly adopted to handle accurate &lt;inline-formula&gt;&lt;tex-math notation=&quot;LaTeX&quot;&gt;$(\alpha,\beta)$&lt;/tex-math&gt;&lt;alternatives&gt;&lt;mml:math&gt;&lt;mml:mrow&gt;&lt;mml:mo&gt;(&lt;/mml:mo&gt;&lt;mml:mi&gt;α&lt;/mml:mi&gt;&lt;mml:mo&gt;,&lt;/mml:mo&gt;&lt;mml:mi&gt;β&lt;/mml:mi&gt;&lt;mml:mo&gt;)&lt;/mml:mo&gt;&lt;/mml:mrow&gt;&lt;/mml:math&gt;&lt;inline-graphic xlink:href=&quot;lu-ieq3-3169386.gif&quot;/&gt;&lt;/alternatives&gt;&lt;/inline-formula&gt;-core queries over bipartite graphs. Aiming at the challenges, under the two-server setting, this paper constructs two privacy-preserving schemes with different levels of security to handle &lt;inline-formula&gt;&lt;tex-math notation=&quot;LaTeX&quot;&gt;$(\alpha,\beta)$&lt;/tex-math&gt;&lt;alternatives&gt;&lt;mml:math&gt;&lt;mml:mrow&gt;&lt;mml:mo&gt;(&lt;/mml:mo&gt;&lt;mml:mi&gt;α&lt;/mml:mi&gt;&lt;mml:mo&gt;,&lt;/mml:mo&gt;&lt;mml:mi&gt;β&lt;/mml:mi&gt;&lt;mml:mo&gt;)&lt;/mml:mo&gt;&lt;/mml:mrow&gt;&lt;/mml:math&gt;&lt;inline-graphic xlink:href=&quot;lu-ieq4-3169386.gif&quot;/&gt;&lt;/alternatives&gt;&lt;/inline-formula&gt;-core queries over the bipartite graph. Specifically, in the proposed schemes, a graph is represented as an index containing an edge table and a node table and further encrypted by a symmetric homomorphic encryption scheme, and then the two servers securely traverse the index. Detailed security analysis shows that both schemes can achieve access pattern privacy, while the security-enhanced one can further protect the structure privacy of the query requests and results. In addition, extensive performance evaluations are conducted, and the results also indicate our proposed schemes are computationally efficient.

Details

Language :
English
ISSN :
15455971
Volume :
20
Issue :
3
Database :
Supplemental Index
Journal :
IEEE Transactions on Dependable and Secure Computing
Publication Type :
Periodical
Accession number :
ejs63069584
Full Text :
https://doi.org/10.1109/TDSC.2022.3169386