Privacy-preserving query over encrypted graph-structured data in cloud computing

Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, Wenjing Lou

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

155 Citations (Scopus)

Abstract

In the emerging cloud computing paradigm, data owners become increasingly motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. For the consideration of users'privacy, sensitive data have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. In this paper, for the first time, we define and solve the problem of privacy-preserving query over encrypted graph-structured data in cloud computing (PPGQ), and establish a set of strict privacy requirements for such a secure cloud data utilization system to become a reality. Our work utilizes the principle of "filtering-and-verification". We pre-build a feature-based index to provide feature-related information about each encrypted data graph, and then choose the efficient inner product as the pruning tool to carry out the filtering procedure. To meet the challenge of supporting graph query without privacy breaches, we propose a secure inner product computation technique, and then improve it to achieve various privacy requirements under the known-background threat model. © 2011 IEEE.
Original languageEnglish
Title of host publicationProceedings - International Conference on Distributed Computing Systems
Pages393-402
DOIs
Publication statusPublished - 2011
Externally publishedYes
Event31st International Conference on Distributed Computing Systems, ICDCS 2011 - Minneapolis, MN, United States
Duration: 20 Jun 201124 Jul 2011

Conference

Conference31st International Conference on Distributed Computing Systems, ICDCS 2011
Country/TerritoryUnited States
CityMinneapolis, MN
Period20/06/1124/07/11

Fingerprint

Dive into the research topics of 'Privacy-preserving query over encrypted graph-structured data in cloud computing'. Together they form a unique fingerprint.

Cite this