Privacy-Guarding Optimal Route Finding with Support for Semantic Search on Encrypted Graph in Cloud Computing Scenario

The arrival of cloud computing age makes data outsourcing an important and convenient application. More and more individuals and organizations outsource large amounts of graph data to the cloud computing platform (CCP) for the sake of saving cost. As the server on CCP is not completely honest and trustworthy, the outsourcing graph data are usually encrypted before they are sent to CCP. The optimal route finding on graph data is a popular operation which is frequently used in many fields. The optimal route finding with support for semantic search has stronger query capabilities, and a consumer can use similar words of graph vertices as query terms to implement optimal route finding. Due to encrypting the outsourcing graph data before they are sent to CCP, it is not easy for data customers to manipulate and further use the encrypted graph data. In this paper, we present a solution to execute privacy-guarding optimal route finding with support for semantic search on the encrypted graph in the cloud computing scenario (PORF). We designed a scheme by building secure query index to implement optimal route finding with support for semantic search based on searchable encryption idea and stemmer mechanism. We give formal security analysis for our scheme. We also analyze the efficiency of our scheme through the experimental evaluation.

[1]  N. Cao,et al.  Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.

[2]  Oded Goldreich,et al.  The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .

[3]  Joonsang Baek,et al.  Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.

[4]  Arunita Jaekel,et al.  Optimal path planning strategies for monitoring coverage holes in Wireless Sensor Networks , 2020, Ad Hoc Networks.

[5]  Jure Leskovec,et al.  Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters , 2008, Internet Math..

[6]  Jiankun Hu,et al.  Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection , 2018, IEEE Transactions on Information Forensics and Security.

[7]  Hua Wang,et al.  Microaggregation Sorting Framework for K-Anonymity Statistical Disclosure Control in Cloud Computing , 2020, IEEE Transactions on Cloud Computing.

[8]  Muttukrishnan Rajarajan,et al.  A parallelized disjunctive query based searchable encryption scheme for big data , 2020, Future Gener. Comput. Syst..

[9]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.

[10]  Brajendra Singh Rajput,et al.  A survey of Stemming Algorithms for Information Retrieval , 2015 .

[11]  Melissa Chase,et al.  Structured Encryption and Controlled Disclosure , 2010, IACR Cryptol. ePrint Arch..

[12]  Jianliang Xu,et al.  Asymmetric structure-preserving subgraph queries for large graphs , 2015, 2015 IEEE 31st International Conference on Data Engineering.

[13]  Leilei Du,et al.  Dynamic multi-client searchable symmetric encryption with support for boolean queries , 2020, Inf. Sci..

[14]  Cong Wang,et al.  Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.

[15]  Eu-Jin Goh,et al.  Secure Indexes , 2003, IACR Cryptol. ePrint Arch..

[16]  Xingming Sun,et al.  Region-Level Visual Consistency Verification for Large-Scale Partial-Duplicate Image Search , 2020, ACM Trans. Multim. Comput. Commun. Appl..

[17]  Qian Wang,et al.  Searchable Encryption over Feature-Rich Data , 2018, IEEE Transactions on Dependable and Secure Computing.

[18]  Xiaofang Zhou,et al.  Fast Query Decomposition for Batch Shortest Path Processing in Road Networks , 2020, 2020 IEEE 36th International Conference on Data Engineering (ICDE).

[19]  Artem A. Sedakov,et al.  Coordinated Influence on the Opinions of Social Network Members , 2020, Autom. Remote. Control..

[20]  Yong Xiang,et al.  Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data , 2020, IEEE Transactions on Cloud Computing.

[21]  Shunli Zhang,et al.  A Novel Range Search Scheme Based on Frequent Computing for Edge-Cloud Collaborative Computing in CPSS , 2020, IEEE Access.

[22]  Michael Mitzenmacher,et al.  Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.

[23]  Jim Duggan,et al.  Dynamic virtual machine consolidation using a multi-agent system to optimise energy efficiency in cloud computing , 2020, Future Gener. Comput. Syst..

[24]  Yun Q. Shi,et al.  Reversible Data Hiding Using Controlled Contrast Enhancement and Integer Wavelet Transform , 2015, IEEE Signal Processing Letters.

[25]  Zongda Wu,et al.  An efficient subscription index for publication matching in the cloud , 2016, Knowl. Based Syst..

[26]  Guoping Jiang,et al.  Bessel-Fourier moment-based robust image zero-watermarking , 2013, Multimedia Tools and Applications.

[27]  Cong Wang,et al.  Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.

[28]  Pascal Lafourcade,et al.  GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation , 2020, DBSec.

[29]  Huaqun Wang,et al.  Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain , 2020, IEEE Transactions on Dependable and Secure Computing.

[30]  Q. M. Jonathan Wu,et al.  Coverless image steganography using partial-duplicate image retrieval , 2018, Soft Computing.

[31]  Catherine D. Schuman,et al.  Neuromorphic Graph Algorithms: Extracting Longest Shortest Paths and Minimum Spanning Trees , 2020, NICE.

[32]  Yiming Yang,et al.  Introducing the Enron Corpus , 2004, CEAS.

[33]  C. Rama Krishna,et al.  Searchable encryption: A survey on privacy‐preserving search schemes on encrypted outsourced data , 2019, Concurr. Comput. Pract. Exp..

[34]  S. Rajsbaum Foundations of Cryptography , 2014 .

[35]  Yan Xiao,et al.  Digital Watermark-Based Independent Individual Certification Scheme in WSNs , 2019, IEEE Access.

[36]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[37]  Pan Li,et al.  Efficient Secure Outsourcing of Large-Scale Convex Separable Programming for Big Data , 2019, IEEE Transactions on Big Data.

[38]  Pengfei Zhou,et al.  Think Like A Graph: Real-Time Traffic Estimation at City-Scale , 2019, IEEE Transactions on Mobile Computing.

[39]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[40]  Cong Wang,et al.  Achieving usable and privacy-assured similarity search over outsourced cloud data , 2012, 2012 Proceedings IEEE INFOCOM.

[41]  Zongmin Cui,et al.  Blind Reversible Authentication Based on PEE and CS Reconstruction , 2018, IEEE Signal Processing Letters.

[42]  Sven de Vries,et al.  Computing cyclic invariants for molecular graphs , 2017, Networks.