Privacy-Preserving Approximate Top-k Nearest Keyword Queries over Encrypted Graphs

Meng Shen, Minghui Wang, Ke Xu, Liehuang Zhu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

With the prosperity of graph-based applications, it is increasingly popular for graph nodes to have labels in terms of a set of keywords. The top-k nearest keyword (k-NK) query can find a set of k nearest nodes containing a designated keyword to a given source node. In cloud computing era, graph owners prefer to outsource their graphs to cloud servers, leading to severe privacy risk for conducting k-NK queries. The current studies fail to support efficient and accurate k-NK query under the premise of privacy protection.In this paper, we propose a new graph encryption scheme Aton, which enables efficient and privacy-preserving k-NK querying. Based on the symmetric-key encryption and particular pseudo-random functions, we construct a secure k-NK query index. Aton is built on a ciphertext sum comparison scheme which can achieve approximate distance comparison with high accuracy. Rigorous security analysis proves that it is CQA-2 secure. Experiments with real-world datasets demonstrate that it can efficiently answer k-NK queries with more accurate results compared with the state-of-the-art.

Original languageEnglish
Title of host publication2021 IEEE/ACM 29th International Symposium on Quality of Service, IWQOS 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781665414944
DOIs
Publication statusPublished - 25 Jun 2021
Event29th IEEE/ACM International Symposium on Quality of Service, IWQOS 2021 - Virtual, Tokyo, Japan
Duration: 25 Jun 202128 Jun 2021

Publication series

Name2021 IEEE/ACM 29th International Symposium on Quality of Service, IWQOS 2021

Conference

Conference29th IEEE/ACM International Symposium on Quality of Service, IWQOS 2021
Country/TerritoryJapan
CityVirtual, Tokyo
Period25/06/2128/06/21

Keywords

  • Cloud computing
  • graph encryption
  • privacy
  • top-k nearest keyword query

Fingerprint

Dive into the research topics of 'Privacy-Preserving Approximate Top-k Nearest Keyword Queries over Encrypted Graphs'. Together they form a unique fingerprint.

Cite this