A systematic review of data models for the big data problem

F Mostajabi, AA Safaei, A Sahafi - IEEE Access, 2021 - ieeexplore.ieee.org
Nowadays, data are generated in a continuous streaming manner as the inputs of various
applications. The sources of such generated data can be wired or wireless sensor networks …

PeGraph: A system for privacy-preserving and efficient search over encrypted social graphs

S Wang, Y Zheng, X Jia, X Yi - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the widespread adoption of cloud computing, it is increasingly popular for online social
network (OSN) service providers to leverage the public cloud as a back-end to manage their …

Survey and open problems in privacy-preserving knowledge graph: merging, query, representation, completion, and applications

C Chen, F Zheng, J Cui, Y Cao, G Liu, J Wu… - International Journal of …, 2024 - Springer
Abstract Knowledge Graph (KG) has attracted more and more companies' attention for its
ability to connect different types of data in meaningful ways and support rich data services …

Rphx: Result pattern hiding conjunctive query over private compressed index using Intel SGX

Q Jiang, EC Chang, Y Qi, S Qi, P Wu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Deploying data storage and query service in an untrusted cloud server raises critical privacy
and security concerns. This paper focuses on the fundamental problem of processing …

{GraphGuard}: Private {Time-Constrained} Pattern Detection Over Streaming Graphs in the Cloud

S Wang, Y Zheng, X Jia - 33rd USENIX Security Symposium (USENIX …, 2024 - usenix.org
Streaming graphs have seen wide adoption in diverse scenarios due to their superior ability
to capture temporal interactions among entities. With the proliferation of cloud computing, it …

PCG: a privacy preserving collaborative graph neural network training framework

X Miao, W Zhang, Y Jiang, F Fu, Y Shao, L Chen… - The VLDB Journal, 2023 - Springer
Graph neural networks (GNNs) and their variants have generalized deep learning methods
into non-Euclidean graph data, bringing substantial improvement in many graph mining …

A framework for privacy preserving localized graph pattern query processing

L Xu, B Choi, Y Peng, J Xu, SS Bhowmick - Proceedings of the ACM on …, 2023 - dl.acm.org
This paper studies privacy preserving graph pattern query services in a cloud computing
paradigm. In such a paradigm, data owner stores the large data graph to a powerful cloud …

TCQ: Achieving Privacy-Preserving -Truss Community Queries Over Outsourced Data

Y Guan, R Lu, S Zhang, Y Zheng… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Community search over graphs, which is believed as a powerful tool for locating subgraphs
of closely related vertices, has received considerable attention in recent years, and-truss is …

MAGO: Maliciously secure subgraph counting on decentralized social graphs

S Wang, Y Zheng, X Jia, Q Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Subgraph counting aims to count over a large graph subgraphs matching a given shape (eg,
triangle), which plays an important role in various social graph analytics applications such …

Tinyenc: Enabling compressed and encrypted big data stores with rich query support

S Qi, J Wang, M Miao, M Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Encryption and compression are two critical techniques to ensure data confidentiality and
efficiency for a cloud-based data storage system, respectively. However, directly combing …