Outsourced analysis of encrypted graphs in the cloud with privacy protection

D Selvaraj, SM Sankar, D Dhinakaran… - arXiv preprint arXiv …, 2023 - arxiv.org
Huge diagrams have unique properties for organizations and research, such as client
linkages in informal organizations and customer evaluation lattices in social channels. They …

PrivateGraph: Privacy-preserving spectral analysis of encrypted graphs in the cloud

S Sharma, J Powers, K Chen - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Big graphs, such as user interactions in social networks and customer rating matrices in
collaborative filters, possess great values for both businesses and research. They are not …

Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection

M Shen, B Ma, L Zhu, R Mijumbi… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Constrained shortest distance (CSD) querying is one of the fundamental graph query
primitives, which finds the shortest distance from an origin to a destination in a graph with a …

PGAS: Privacy-preserving graph encryption for accurate constrained shortest distance queries

C Zhang, L Zhu, C Xu, K Sharif, C Zhang, X Liu - Information Sciences, 2020 - Elsevier
The constrained shortest distance (CSD) query is used to determine the shortest distance
between two vertices of a graph while ensuring that the total cost remains lower than a given …

Enabling privacy-preserving shortest distance queries on encrypted graph data

C Liu, L Zhu, X He, J Chen - IEEE Transactions on Dependable …, 2018 - ieeexplore.ieee.org
When coming to perform shortest distance queries on encrypted graph data outsourced in
external storage infrastructure such as cloud, a significant challenge is how to compute the …

SecGDB: Graph encryption for exact shortest distance queries with efficient updates

Q Wang, K Ren, M Du, Q Li, A Mohaisen - … , FC 2017, Sliema, Malta, April 3 …, 2017 - Springer
In the era of big data, graph databases have become increasingly important for NoSQL
technologies, and many systems can be modeled as graphs for semantic queries …

How to securely outsource finding the min-cut of undirected edge-weighted graphs

P Zhao, J Yu, H Zhang, Z Qin… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Finding min-cut is a fundamental operation in graph theory. It has been widely used in many
applications such as image segmentation and network partition. However, solving the min …

Grecs: Graph encryption for approximate shortest distance queries

X Meng, S Kamara, K Nissim, G Kollios - Proceedings of the 22nd ACM …, 2015 - dl.acm.org
We propose graph encryption schemes that efficiently support approximate shortest distance
queries on large-scale encrypted graphs. Shortest distance queries are one of the most …

Secgnn: Privacy-preserving graph neural network training and inference as a cloud service

S Wang, Y Zheng, X Jia - IEEE Transactions on Services …, 2023 - ieeexplore.ieee.org
Graphs are widely used to model the complex relationships among entities. As a powerful
tool for graph analytics, graph neural networks (GNNs) have recently gained wide attention …

Efficient graph encryption scheme for shortest path queries

E Ghosh, S Kamara, R Tamassia - Proceedings of the 2021 ACM Asia …, 2021 - dl.acm.org
Graph encryption schemes (introduced by [Chase and Kamara, 2010]) have been receiving
growing interest across various disciplines due to their attractive tradeoff between …