Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2882903.2882956acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
research-article
Public Access

Privacy Preserving Subgraph Matching on Large Graphs in Cloud

Published: 14 June 2016 Publication History

Abstract

The wide presence of large graph data and the increasing popularity of storing data in the cloud drive the needs for graph query processing on a remote cloud. But a fundamental challenge is to process user queries without compromising sensitive information. This work focuses on privacy preserving subgraph matching in a cloud server. The goal is to minimize the overhead on both cloud and client sides for subgraph matching, without compromising users' sensitive information. To that end, we transform an original graph $G$ into a privacy preserving graph Gk, which meets the requirement of an existing privacy model known as k-automorphism. By making use of the symmetry in a k-automorphic graph, a subgraph matching query can be efficiently answered using a graph Go, a small subset of Gk. This approach saves both space and query cost in the cloud server. We also anonymize the query graphs to protect their label information using label generalization technique. To reduce the search space for a subgraph matching query, we propose a cost model to select the more effective label combinations. The effectiveness and efficiency of our method are demonstrated through extensive experimental results on real datasets.

References

[1]
http://neo4j.org/.
[2]
What is cloud computing? Amazon Web Services, (3).
[3]
N. Cao, Z. Yang, C. Wang, K. Ren, and W. Lou. Privacy-preserving query over encrypted graph-structured data in cloud computing. In ICDCS, pages 393--402, 2011.
[4]
R. Chen, B. C. M. Fung, P. S. Yu, and B. C. Desai. Correlated network data publication via differential privacy. VLDB J., pages 1--24, 2013.
[5]
S. Chen and S. Zhou. Recursive mechanism: Towards node differential privacy and unrestricted joins. In SIGMOD, pages 653--664, 2013.
[6]
J. Cheng, A. W. Fu, and J. Liu. K-isomorphism: Privacy preserving network publication against structural attacks. In SIGMOD, pages 459--470, 2010.
[7]
S. Das, Ömer Egecioglu, and A. E. Abbadi. Anonymizing weighted social network graphs. In ICDE, pages 904--907, 2010.
[8]
C. Dwork, F. Mcsherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography Conference, 2006.
[9]
J. Gao, J. Y. Xu, R. Jin, J. Zhou, T. Wang, and D. Yang. Neighborhood-privacy protected shortest distance computing in cloud. In SIGMOD, 2011.
[10]
M. Hay, G. Miklau, D. Jensen, D. F. Towsley, and P. Weis. Resisting structural re-identification in anonymized social networks. PVLDB, 1(1):102--114, 2008.
[11]
G. Karypis and V. Kumar. Analysis of multilevel graph partitioning. In SC, 1995.
[12]
J. Lee, W. Han, R. Kasperovics, and J. Lee. An in-depth comparison of subgraph isomorphism algorithms in graph databases. PVLDB, 6(2):133--144, 2012.
[13]
K. Liu and E. Terzi. Towards identity anonymization on graphs. In SIGMOD, pages 93--106, 2008.
[14]
Y. Low, J. Gonzalez, A. Kyrola, D. Bickson, C. Guestrin, and J. M. Hellerstein. Graphlab: A new framework for parallel machine learning. In UAI, 2010.
[15]
J. Pérez, M. Arenas, and C. Gutierrez. Semantics and complexity of SPARQL. ACM Trans. Database Syst., 34(3), 2009.
[16]
A. Sala, X. Zhao, C. Wilson, H. Zheng, and B. Y. Zhao. Sharing graphs using differentially private graph models. In IMC, pages 679--688, 2011.
[17]
P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, SRI International, 1998.
[18]
Z. Sun, H. Wang, H. Wang, B. Shao, and J. Li. Efficient subgraph matching on billion node graphs. PVLDB, 5(9), 2012.
[19]
L. Sweeney. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5):557--570, 2002.
[20]
C. Tai, P. Tseng, P. S. Yu, and M. Chen. Identity protection in sequential releases of dynamic networks. IEEE Trans. Knowl. Data Eng., 26(3):635--651, 2014.
[21]
C.-H. Tai, P. S. Yu, D.-N. Yang, and M.-S. Chen. Privacy-preserving social network publication against friendship attacks. In KDD, pages 1262--1270, 2011.
[22]
W. Wu, Y. Xiao, W. Wang, Z. He, and Z. Wang. K-symmetry model for identity anonymization in social networks. In EDBT, pages 111--122, 2010.
[23]
X. Yan, P. S. Yu, and J. Han. Graph indexing based on discriminative frequent structure analysis. TODS, 30(4):960--993, 2005.
[24]
B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. In ICDE, pages 506--515, 2008.
[25]
L. Zou, L. Chen, and M. T. Özsu. Distancejoin: Pattern match query in a large graph database. PVLDB, 2(1), 2009.
[26]
L. Zou, L. Chen, and M. T. Özsu. K-automorphism: A general framework for privacy preserving network publication. In VLDB, 2009.

Cited By

View all
  • (2024)eGrass: An Encrypted Attributed Subgraph Matching System With Malicious SecurityIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.340908919(5999-6014)Online publication date: 2024
  • (2024)kTCQ: Achieving Privacy-Preserving k-Truss Community Queries Over Outsourced DataIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.331740121:4(2750-2765)Online publication date: Jul-2024
  • (2024)Efficient and Privacy-Preserving Aggregate Query Over Public Property GraphsIEEE Transactions on Big Data10.1109/TBDATA.2023.334262310:2(146-157)Online publication date: Apr-2024
  • Show More Cited By

Index Terms

  1. Privacy Preserving Subgraph Matching on Large Graphs in Cloud

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGMOD '16: Proceedings of the 2016 International Conference on Management of Data
    June 2016
    2300 pages
    ISBN:9781450335317
    DOI:10.1145/2882903
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 June 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. cloud
    2. graph
    3. privacy
    4. subgraph match

    Qualifiers

    • Research-article

    Funding Sources

    • NSF
    • 863 project
    • NSFC

    Conference

    SIGMOD/PODS'16
    Sponsor:
    SIGMOD/PODS'16: International Conference on Management of Data
    June 26 - July 1, 2016
    California, San Francisco, USA

    Acceptance Rates

    Overall Acceptance Rate 785 of 4,003 submissions, 20%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)138
    • Downloads (Last 6 weeks)24
    Reflects downloads up to 08 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)eGrass: An Encrypted Attributed Subgraph Matching System With Malicious SecurityIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.340908919(5999-6014)Online publication date: 2024
    • (2024)kTCQ: Achieving Privacy-Preserving k-Truss Community Queries Over Outsourced DataIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.331740121:4(2750-2765)Online publication date: Jul-2024
    • (2024)Efficient and Privacy-Preserving Aggregate Query Over Public Property GraphsIEEE Transactions on Big Data10.1109/TBDATA.2023.334262310:2(146-157)Online publication date: Apr-2024
    • (2024)VPCS: Verifiable Query Scheme for Privacy-preserving Constrained Shortest Path over Encrypted Graph Data2024 IEEE International Conference on Web Services (ICWS)10.1109/ICWS62655.2024.00145(1217-1226)Online publication date: 7-Jul-2024
    • (2024)FRESH: Towards Efficient Graph Queries in an Outsourced Graph2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00346(4545-4557)Online publication date: 13-May-2024
    • (2024)A Survey of Privacy Preserving Subgraph Matching MethodsArtificial Intelligence Security and Privacy10.1007/978-981-99-9785-5_8(98-113)Online publication date: 4-Feb-2024
    • (2023)SPG: Structure-Private Graph Database via SqueezePIRProceedings of the VLDB Endowment10.14778/3587136.358713816:7(1615-1628)Online publication date: 8-May-2023
    • (2023)A Framework for Privacy Preserving Localized Graph Pattern Query ProcessingProceedings of the ACM on Management of Data10.1145/35892741:2(1-27)Online publication date: 20-Jun-2023
    • (2023)ShieldDB: An Encrypted Document Database With Padding CountermeasuresIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2021.312660735:4(4236-4252)Online publication date: 1-Apr-2023
    • (2023)PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in CloudIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.326214718(2030-2045)Online publication date: 2023
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media