TY - JOUR
T1 - Privacy-preserving graph encryption for approximate constrained shortest distance queries
AU - Shen, Meng
AU - Chen, Siqi
AU - Zhu, Liehuang
AU - Xiao, Renyi
AU - Xu, Ke
AU - Du, Xiaojiang
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019
Y1 - 2019
N2 - Constrained shortest distance (CSD) queries are a valuable extension of the traditional pairwise shortest distance computation over graph-structured data, where the answers to the queries should fulfill a cost constraint (e.g., the toll payment in road networks). With the popularity of cloud computing, data owners have a strong desire to migrate their privacy-sensitive graphs to remote servers without losing the ability to query them. Existing graph encryption schemes cannot provide security guarantees for CSD queries. In this paper, we present Acro, a graph encryption scheme, which executes approximate CSD queries securely. The homomorphic encryption and the symmetric-key primitives are applied to our scheme. Through a security analysis, we prove that Acro meets the security definition of CQA2-security. The prototype of Acro is implemented and evaluated using real datasets. The results show that our proposal outperforms a state-of-the-art baseline in terms of query accuracy at the cost of enlarging query completion time.
AB - Constrained shortest distance (CSD) queries are a valuable extension of the traditional pairwise shortest distance computation over graph-structured data, where the answers to the queries should fulfill a cost constraint (e.g., the toll payment in road networks). With the popularity of cloud computing, data owners have a strong desire to migrate their privacy-sensitive graphs to remote servers without losing the ability to query them. Existing graph encryption schemes cannot provide security guarantees for CSD queries. In this paper, we present Acro, a graph encryption scheme, which executes approximate CSD queries securely. The homomorphic encryption and the symmetric-key primitives are applied to our scheme. Through a security analysis, we prove that Acro meets the security definition of CQA2-security. The prototype of Acro is implemented and evaluated using real datasets. The results show that our proposal outperforms a state-of-the-art baseline in terms of query accuracy at the cost of enlarging query completion time.
KW - Constrained shortest distance querying
KW - Graph encryption
KW - Privacy-preserving
KW - Searchable encryption
UR - http://www.scopus.com/inward/record.url?scp=85081985267&partnerID=8YFLogxK
U2 - 10.1109/GLOBECOM38437.2019.9014247
DO - 10.1109/GLOBECOM38437.2019.9014247
M3 - Conference article
AN - SCOPUS:85081985267
SN - 2334-0983
JO - Proceedings - IEEE Global Communications Conference, GLOBECOM
JF - Proceedings - IEEE Global Communications Conference, GLOBECOM
M1 - 9014247
T2 - 2019 IEEE Global Communications Conference, GLOBECOM 2019
Y2 - 9 December 2019 through 13 December 2019
ER -