Back to Search
Start Over
Achieving Efficient and Privacy-Preserving (<inline-formula><tex-math notation="LaTeX">$\alpha,\beta$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>α</mml:mi><mml:mo>,</mml:mo><mml:mi>β</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href="lu-ieq1-3169386.gif"/></alternatives></inline-formula>)-Core Query Over Bipartite Graphs in Cloud
- Source :
- IEEE Transactions on Dependable and Secure Computing; 2023, Vol. 20 Issue: 3 p1979-1993, 15p
- Publication Year :
- 2023
-
Abstract
- Bipartite graphs have been widely adopted in applications such as e-healthcare and recommendation systems thanks to their ability to model various real-world relationships. Meanwhile, <inline-formula><tex-math notation="LaTeX">$(\alpha,\beta)$</tex-math><alternatives><mml:math><mml:mrow><mml:mo>(</mml:mo><mml:mi>α</mml:mi><mml:mo>,</mml:mo><mml:mi>β</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href="lu-ieq2-3169386.gif"/></alternatives></inline-formula>-core query services over bipartite graphs are generally recognized as a promising approach for finding communities, i.e., sets of closely related vertices, in a bipartite graph. As the bipartite graph grows, the service providers tend to outsource the services to the cloud for flexible and highly reliable computational resources. However, since the cloud is not fully trustable, there are privacy concerns related to the dataset, query requests, and results. Although many schemes have been proposed for privacy-preserving queries over graphs, they cannot be directly adopted to handle accurate <inline-formula><tex-math notation="LaTeX">$(\alpha,\beta)$</tex-math><alternatives><mml:math><mml:mrow><mml:mo>(</mml:mo><mml:mi>α</mml:mi><mml:mo>,</mml:mo><mml:mi>β</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href="lu-ieq3-3169386.gif"/></alternatives></inline-formula>-core queries over bipartite graphs. Aiming at the challenges, under the two-server setting, this paper constructs two privacy-preserving schemes with different levels of security to handle <inline-formula><tex-math notation="LaTeX">$(\alpha,\beta)$</tex-math><alternatives><mml:math><mml:mrow><mml:mo>(</mml:mo><mml:mi>α</mml:mi><mml:mo>,</mml:mo><mml:mi>β</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href="lu-ieq4-3169386.gif"/></alternatives></inline-formula>-core queries over the bipartite graph. Specifically, in the proposed schemes, a graph is represented as an index containing an edge table and a node table and further encrypted by a symmetric homomorphic encryption scheme, and then the two servers securely traverse the index. Detailed security analysis shows that both schemes can achieve access pattern privacy, while the security-enhanced one can further protect the structure privacy of the query requests and results. In addition, extensive performance evaluations are conducted, and the results also indicate our proposed schemes are computationally efficient.
Details
- Language :
- English
- ISSN :
- 15455971
- Volume :
- 20
- Issue :
- 3
- Database :
- Supplemental Index
- Journal :
- IEEE Transactions on Dependable and Secure Computing
- Publication Type :
- Periodical
- Accession number :
- ejs63069584
- Full Text :
- https://doi.org/10.1109/TDSC.2022.3169386