Cloud-Based Approximate Constrained Shortest Distance Queries over Encrypted Graphs with Privacy Protection

Meng Shen, Baoli Ma, Liehuang Zhu*, Rashid Mijumbi, Xiaojiang Du, Jiankun Hu

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

149 Citations (Scopus)

Abstract

Constrained shortest distance (CSD) querying is one of the fundamental graph query primitives, which finds the shortest distance from an origin to a destination in a graph with a constraint that the total cost does not exceed a given threshold. CSD querying has a wide range of applications, such as routing in telecommunications and transportation. With an increasing prevalence of cloud computing paradigm, graph owners desire to outsource their graphs to cloud servers. In order to protect sensitive information, these graphs are usually encrypted before being outsourced to the cloud. This, however, imposes a great challenge to CSD querying over encrypted graphs. Since performing constraint filtering is an intractable task, existing work mainly focuses on unconstrained shortest distance queries. CSD querying over encrypted graphs remains an open research problem. In this paper, we propose Connor, a novel graph encryption scheme that enables approximate CSD querying. Connor is built based on an efficient, tree-based ciphertext comparison protocol, and makes use of symmetric-key primitives and the somewhat homomorphic encryption, making it computationally efficient. Using Connor, a graph owner can first encrypt privacy-sensitive graphs and then outsource them to the cloud server, achieving the necessary privacy without losing the ability of querying. Extensive experiments with real-world data sets demonstrate the effectiveness and efficiency of the proposed graph encryption scheme.

Original languageEnglish
Article number8113498
Pages (from-to)940-953
Number of pages14
JournalIEEE Transactions on Information Forensics and Security
Volume13
Issue number4
DOIs
Publication statusPublished - Apr 2018

Keywords

  • Cloud computing
  • constrained shortest distance querying
  • graph encryption
  • privacy

Fingerprint

Dive into the research topics of 'Cloud-Based Approximate Constrained Shortest Distance Queries over Encrypted Graphs with Privacy Protection'. Together they form a unique fingerprint.

Cite this