This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
1. Introduction
With the rapid progress of electronic devices and communication technologies, it promotes the advent of the era of cloud computing that has an important impact and value on all walks of life [1, 2]. Cloud computing also speeds up data outsourcing service and makes it an important and convenient application [3, 4]. Graph is a structure that is often used in various fields, such as traffic graph [5], social graph [6], and molecular structure graph [7]. Due to the powerful processing capability of cloud computing and the problem of cost saving, the enormous graph data are usually outsourced to the cloud computing platform (CCP) which is responsible for storing, managing, and processing these data. But the server on CCP is not completely honest and trustworthy, the privacy and security issues of the outsourcing graph data need to be considered and handled. Encrypting the outsourcing graph data is an effective and commonly used method before they are outsourced to CCP [8]. However, it is not easy for data customers to manipulate and further use the encrypted outsourcing graph data. Therefore, it is an extremely meaningful work to implement privacy-guarding optimal route finding with support for semantic search on the encrypted graph in the cloud computing scenario.
The optimal route finding on graph is an operation that is frequently used in many fields, and related applications include shortest path query [9], path planning [10], and minimum spanning tree [11]. The optimal route finding with support for semantic search has stronger query capabilities, and a customer can use similar words of graph vertices as query terms to implement optimal route finding. For instance, in a traffic network graph, the graph vertices represent locations, and the weight on the edge represents the route cost between two locations. The optimal path finding is to query for the path with the least cost between two locations. To realize semantic search, the porter stemmer mechanism commonly used in information retrieval [12] is adopted in this paper. The graph vertex set is transformed into a new set by the stemmer mechanism, and the new set is similar to the original set of vertices in semantics. When performing optimal route finding, the new set serves as the source set of query terms. Our work researches optimal route finding over encrypted graph data, and we also take into account cost savings; it is expensive in cost to download all the graph data from the remote server. In view of this, it is of great significance to implement optimal route finding with support for semantic search on encrypted graph. However, it is not an easy job to carry out the optimal route finding in consideration of the security and privacy issues in the cloud computing scenario.
To implement query operations on the remote server in the cloud computing scenario, the idea of searchable encryption is very effective [13–17]. The remote server performs query through encrypted query terms, and the server cannot obtain the privacy information of the query terms and query results. The searchable encryption is a research hotspot in the area of information security, and the research progress in this field has also been advancing. Soon after, some dynamic and extended searchable encryption schemes have emerged [18–22], but the above searchable encryption schemes cannot be used to implement route finding with support for semantic search on encrypted graph. Recently, some researchers have studied and implemented some query schemes on the encrypted graph [23–27]. Chase et al. studied the query problem on the encrypted graph and proposed the structured encryption method [23]. Privacy preserving subgraph query problems were researched in the literatures [24, 25]. Shen et al. studied the problem of cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection [26]. Ciucanu et al. presented a secure framework for graph outsourcing and SPARQL evaluation in the literature [27]. However, these methods cannot address the problem of optimal route finding with support for semantic search on encrypted graph.
To solve the problem on CCP, we present a solution to execute privacy-guarding optimal route finding with support for semantic search on the encrypted graph in the cloud computing scenario (PORF). In the PORF scheme, the server on CCP implements the privacy-guarding optimal route finding with the help of the index we build. Firstly, we use porter stemmer mechanism to transform the graph vertices into a new set to achieve semantic search. Then, based on the new set, we build the chain tables, and each node of which contains optimal route information. Finally, we build a secure index on the basis of all the chain tables, and the index is stored on the server of CCP, and the server executes optimal route finding by the index and the encrypted query terms. The server cannot learn the privacy contents of the query results and query terms. The security analysis and the experimental evaluation show that our proposed PORF scheme is secure and efficient.
The contributions of our paper are described below.
(1) We present a scheme to address the problem of optimal route finding with support for semantic search on the encrypted graph in the cloud computing scenario
(2) We give the formal security analysis of the scheme to ensure the privacy and security of query results and query terms
(3) We conduct an experimental analysis to demonstrate the efficiency of our scheme
The rest of our paper is organized below. Section 2 presents the related work. Section 3 gives the design and analysis process of our PORF scheme. Section 4 analyzes the security of the PORF scheme. Section 5 demonstrates the PORF scheme through experiment and comparison. Finally, section 6 summarizes our paper.
2. Related Work
With the rapid development of computer technology and the huge increase of people’s demands [28–31], privacy and security issues have increasingly become an important consideration [32–35]. In the field of data outsourcing security, searchable encryption plays an important role and can realize the query of outsourcing data without disclosing privacy information [36, 37]. Generally speaking, there are two kinds of searchable encryption types: searchable symmetric encryption and searchable asymmetric encryption [16, 17]. Usually, the querying of symmetric encryption is more efficient than that of asymmetrical encryption. Thus, we use symmetric encryption idea in our scheme.
Searchable encryption becomes an efficient cryptographic primitive in remote data query which plays an important value in data outsourcing [13–16]. The concept and idea of searchable symmetric encryption was first presented in the literature [13]. Goh came up with the secure index strategy in which the bloom filter was used to address the search question on outsourced data in the literature [14]. Curtmola et al. put forward the conception of nonadaptive searchable symmetric encryption and adaptive searchable symmetric encryption in the literature [16]. Chang et al. adopted pseudorandom functions to solve the problem of privacy preserving keyword searches on remote encrypted data and solved the update problem [17]. Thereafter, some researchers in the field of security proposed a lot of outspread searchable encryption solutions [18–22]. Wang et al. investigate the problem of secure and efficient similarity search over outsourced cloud data and proposed a new symbol-based trietraverse searching mechanism [18]. The questions of the secure and efficient ranked search over encrypted outsourcing data were studied in the literatures [19, 20]. Du et al. presented a dynamic multiclient searchable symmetric encryption scheme supporting Boolean queries which allowed the data owner to authorize multiple users to excute Boolean queries over the encrypted data [21]. Li et al. used the
In recent years, the secure query questions on encrypted graph were studied, and some relative research achievements have been acquired [23–27]. Chase et al. presented the idea of structured encryption and proposed the application of controlled disclosure in the literature [23]. Cao et al. adopted the “filtering-and-verification” principle to study and address the problem of subgraph query on the encrypted graph [24]. Fan et al. proposed a private subgraph query solution for large graphs, and the query subgraph needed to be protected while the data graph did not [25]. Shen et al. proposed a graph encryption scheme to achieve the constrained shortest distance query and presented a tree-based ciphertext comparison protocol [26]. Ciucanu et al. designed and implemented a secure framework to perform the quey with SPARQL evaluation on outsourcing graphs in the literature [27]. However, all the existing solutions of encrytped graph search have not addressed the issue of privacy-guarding optimal route finding with support for semantic search on encrypted graph.
In this paper, we come up with a solution on the strength of searchable encryption idea and porter stemmer mechanism to perform optimal route finding with support for semantic search. We first transform graph vertices into new word set and build the chain tables based on the new set. We next build an index which is sent to the server on CCP, and the server excutes optimal route finding through the index and the encrypted query terms. We finally analyze and evaluate our solution both from security and experiment.
3. PORF Scheme Construction
3.1. Preliminaries
Goldwasser et al. presented the concepts of semantic security and indistinguishability in the literature [38]. A system is semantically secure if whatever an adversary can compute about the plaintext given the ciphertext, he can also compute without the ciphertext [38]. In this paper, we use the set
To implement semantic search in our PORF scheme, we adopt the porter stemmer mechanism in information retrieval [12], but not limited to only this method can achieve. We use
Table 1
Summary of notations.
Notations | Denotations |
The outsourcing graph | |
The optimal route finding index | |
The number of vertices of graph | |
The vertices set of graph | |
The number of optimal routes of graph | |
The words | |
The maximum number of optimal routes about querying vertices in graph | |
The encrypted query term, where | |
The set of optimal route finding results of query term | |
The symmetric encryption algorithm | |
The symmetric decryption algorithm |
3.2. PORF Overview
In the cloud computing scenario, the architecture about outsourcing query illustrated in Figure 1 is mainly composed of three entities: the server on CCP, the data owner, and data customers. The server provide data owners and customers with storage, management, and query services. To enable the server to implement optimal route finding on the encrypted outsourcing graph, we construct an index and encrypt the query request and then put them on the server. In this work, our main task is to study and achieve optimal route finding with support for semantic search. With respect to the query control and authentication of data customers, we adopt the thought of preexisting searchable encryption such as broadcast encryption [16].
[figure omitted; refer to PDF]
Our PORF scheme can perform optimal route finding with support for semantic search over the encrypted graph on CCP, and the following design targets can be achieved.
(1) Privacy-guarding optimal route finding functionality. The customer can achieve privacy-guarding optimal route finding with support for semantic search by means of the server on CCP
(2) Security guarantee. We can give the security guarantee for our scheme through formal analysis, and it prevents the server from getting the privacy of the query results and query terms
(3) Efficiency. We can implement our scheme of optimal route finding with less overhead
In the PORF scheme design, we make use of index and chain table on the part of data structures. Our work considers the undirected graph as the research object, and the processing operation of directed graph is similar. We adopt the chain tables to store the optimal route information. Query vertices need to be processed and encrypted before being sent to the server, and the index is then built to complete privacy-guarding optimal route finding via the server on CCP.
To implement the optimal route finding in the cloud computing scenario, we try to deal with it in three steps. Firstly, we build the chain tables, and each node of the chain tables consists of the vertices and optimal route information which need to be encrypted. Secondly, we are going to build a secure index to randomly store all the nodes of the chain tables. Finally, the query vertices of a customer are delivered to the server after security processing, and the server executes optimal route finding with support for semantic search on CCP with the help of the built index. Consistent with the thought of existing symmetric searchable encryption schemes [16, 18, 19], we assume that the server on CCP will adopt the adaptive attack model, and the query customers have the mutual request authentication and query control mechanisms with the data owner [16].
3.3. Scheme Design and Implementation
In the PORF scheme, our main work is to build the index and how to implement optimal route finding by means of the index on CCP. The several used algorithms in our scheme are described below.
(i) Genkeys (
(ii) Chaintablebuilding (
(iii) Indexbuilding (
(iv) Querybuilding (
(v) Queryperforming (
In our work, we use
3.3.1. Building Chain Table
To implement the semantic search, we adopt the porter stemmer mechanism to turn graph vertices set
In the algorithm
Algorithm 1:Chaintablebuilding.
Input: The graph data
Output: The chain table set
1: The set of graph vertices is
2: for all
3: Each member
4: end for
5: for all
6: Two arbitrary inequable words
7: end for
8: for all
9: for all
10:
11:
12: end for
13: end for
14:
15: return
3.3.2. Building Optimal Route Finding Index
To enable the server to perform optimal route finding in the cloud computing scenario, we propose to implement this by building an index. The process of creating our index is described in Algorithm 2. For each chain table
In the algorithm
Algorithm 2:Indexbuilding.
Input:
Output:
1: The compound terms set is
2: for all
3: for all
4:
/
5:
6: end for
7: end for
8: for all
9: if
10: for all
11:
12:
13: end for
14: end if
15: end for
16: return
3.3.3. Performing Optimal Route Finding
After the index is built, we will consider how to execute optimal route finding through the server on CCP. To accomplish this operation, for the element
In the algorithm
Algorithm 3:Queryperforming.
Input:
Output:
1: Generating the query term of the member
2: for all
3: if
4: put
5: end if
6: end for
7: return
In the paper, we propose a solution to solve the problem of privacy-guarding optimal route finding with support for semantic search on the encrypted graph in the cloud computing scenario. By the aid of encrypted query terms and a secure index, the server of CCP executes the privacy-guarding optimal route finding and returns the encrypted query results to the query customer. Our scheme satisfies the efficiency and the query security, and the server cannot obtain the privacy information of the query terms and the retrieval results.
4. Security Analysis
Now, we analyze the security of the PORF scheme. We first give several concepts used in security analysis of our scheme [10].
(i) History: the interaction between the server on CCP and a query customer, containing the graph data
(ii) View: existing the history
(iii) Access Pattern: existing the history
(iv) Search Pattern: existing the history
(v) Trace: existing the history
The server on CCP will perform optimal route finding through the index and the query term and cannot get the contents of the query results and the query term. In our work, we prove our optimal route finding scheme meets the adaptive semantic security. About the adaptive attack model, the server on CCP can make a choice from the query request on account of the query term and the results about optimal route finding of previous queries [10, 36]. For the consideration of security analysis, we follow the security idea adopted in the previous schemes [10, 36]. According to the security guarantee of our PORF scheme, the server on CCP cannot obtain the additional information apart from the trace, and hence our proposed scheme of optimal route finding is secure. The security theorem of our PORF scheme is stated below.
Theorem 1.
Our PORF scheme meets the adaptive semantic security of searchable symmetric encryption idea.
Proof.
To prove the security of the PORF scheme, we first describe a polynomial-size simulator
For
For
To generate
It is very obvious that the query terms
5. Experimental Evaluations
In this section, we will carry out experimental analysis of our scheme on the Enron email network graph [40, 41] and then give the evaluation results. The content of the experiment is completed through using C language program coding over the server on CCP and the local machine. The server on CCP is configured with the Linux operating system of 6 CPU cores with 3.0 GHz and 16 GB of RAM, and the local machine runs on the Windows 10 operating system equipped with Intel Core 4 CPU of 2.6 GHz. In our experimental analysis and evaluation, the index generation, query term generation, and the decryption of query results are performed on the local machine. The operation of optimal route finding is implemented on the server of CCP.
To verify the efficiency of our scheme in the experimental analysis, we compare our PORF scheme with the optimal route finding scheme in plaintext, which is referred to as MORF. The MORF scheme is similar with the PORF scheme, and the index is constructed in a similar way. But in the MORF scheme, the data and index are not encrypted. Comparing our PORF scheme with the MORF scheme, it is intended to evaluate the time and memory overhead over encrypted graph. For the outsourcing graph of the same number of vertices, the difference of the number of edges can have a certain effect on the experimental analysis. Therefore, for the outsourcing graph used in our experiment, we adopt five graph data sets chose at random and think about two circumstances to compare and evaluate the performances. One circumstance is that the outsourcing graph includes more edges, and the number of edges in the graph sets is, respectively, 7958, 16934, 35819, 73586, and 119823. The other circumstance includes less edges which contains half of the number or so of the first circumstance. In the experimental evaluation, we use PORF1 and MORF1 to denote the experiments containing much more edges, and PORF2 and MORF2 to denote the experiments containing less edges. The comparative analysis of our experiment about these circumstances can assess overhead issues of optimal route finding and validate the efficiency of our PORF scheme.
5.1. Index Building
To perform secure optimal route finding on CCP, we first need to transform the graph vertices to complete the semantic search requirements and generate new word set. The chain tables are then built on top of the new word set to hold the optimal route information, and finally, the index is generated based on all the chain tables through the
[figure omitted; refer to PDF]
From Figure 2, we can conclude that index building time and the number of vertices are closely related, and the time of index generation increases nearly linearly with the number of vertices under four conditions of PORF1, PORF2, MORF1, and MORF2. Generally, an outsourcing graph with more numbers of edges can have more optimal routes. Therefore, the time of index generation under PORF1 condition is more than that under PORF2 condition, and similarly the time of index generation under MORF1 condition is more than that under MORF2 condition. For the encrypted graph query, we need to encrypt the graph data and build the encrypted index. As a result, the time of index generation is more than that on the plaintext graph. Under PORF condition, we get the security of private data with encryption time cost. After building the encrypted index, the queries on CCP can meet security requirements, and customers’ privacy information cannot be compromised. Therefore, it is an effective way to increase index building time costs appropriately, and the process of encryption is done locally.
The experimental analysis of the size about index generation is plotted in Figure 3. The abscissa of the figure shows the number of vertices in the graph data, and the ordinate represents the size of index generation. The curves of the size about index generation are changing approximately linearly with the vertex count increases under the four conditions. For outsourcing graphs of the same number of vertices, the more number of edges there are, the larger building size of the index is. Therefore, the index generation size of PORF1 is larger than that of PORF2, and the index generation size of MORF1 is larger than that of MORF2. The proposed PORF scheme can ensure the security of query process with additional storage overhead. The index generation size of PORF is a little larger than that in the plaintext query method, but the difference is not significant.
[figure omitted; refer to PDF]
After the query is processed, the server on CCP sends the encrypted retrieval results to the query customer that completes the decryption locally. The results of experimental analysis about decryption are plotted in Figure 5. The time of the decryption process in our experiment is related to the decryption mechanism and the size of the query results. We adopt the same decryption mechanism under PORF1 and PORF2 two conditions. The decryption time of PORF1 and PORF2 increases almost linearly with the rise of vertex count. Time consumption of the decryption process under PORF2 condition is less than that under PORF2 condition.
In general, the index building of our PORF scheme is completed on local machine, and the time and size of the index are nearly linear to vertex count of the outsourcing graph. The query process is executed by the server on CCP, and the query time also increases with the increasing of vertex count. Meanwhile, the server on CCP does not get the privacy contents about the retrieval results and query terms. Our PORF scheme implements optimal route finding with support for semantic search on the encrypted graph and satisfies the privacy and efficiency of the query process.
6. Conclusion
In this paper, we propose a novel solution to address the problem of optimal route finding with support for semantic search, in which we adopt searchable encryption idea and porter stemmer mechanism. We first convert all graph vertices into a new word set by porter stemmer mechanism to satisfy semantic search. Then, we build the chain tables based on the new word set to place optimal route information and build an index based on the chain tables which is used to execute optimal route finding. Secondly, we prove the security of our scheme through formal analysis. Finally, we give experimental analysis and evaluation, and the results show that our scheme has good performance.
For our future work, we intend to build dynamic optimal route finding scheme to meet the needs of dynamic graphs. In addition, our other research direction is to combine encryption graph query with secret key management and update to meet a wider range of query requirements.
Acknowledgments
The authors thank the editor and the reviewers’ comments and helpful suggestions. This work was supported in part by the Nature Science Foundation of China under Grant 61762055, Grant 61962029, Grant 61662039, and Grant 61741111, in part by the Jiangxi Provincial Natural Science Foundation of China under Grant 20181BAB202014, Grant 20202ACBL202005, Grant 20181BAB202011, and Grant 20202BAB212006, in part by the Key Scientific and Technological Research Project of Jiangxi Provincial Education Department of China under Grant GJJ190899, in part by the Jiangxi Key Natural Science Foundation under Grant 20192ACBL20031, in part by the Science and Technology Research Project of Jiangxi Education Department under Grant GJJ180904, in part by the Humanities and Social Sciences Foundation of Colleges and Universities in Jiangxi Province under Grant TQ18111, and in part by the Key Program of Zhejiang Provincial Natural Science Foundation of China under Grant LZ18F020001.
[1] J. Baek, R. Safavi-Naini, W. Susilo, "Public key encryption with keyword search revisited," Computational Science and Its Applications - ICCSA 2008, International Conference, pp. 1249-1259, .
[2] F. Berger, P. Gritzmann, S. de Vries, "Computing cyclic invariants for molecular graphs," Networks, vol. 70 no. 2, pp. 116-131, DOI: 10.1002/net.21757, 2017.
[3] N. Cao, C. Wang, M. Li, K. Ren, W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," IEEE Transactions on Parallel and Distributed Systems, vol. 25 no. 1, pp. 222-233, DOI: 10.1109/TPDS.2013.45, 2014.
[4] N. Cao, Z. Yang, C. Wang, K. Ren, W. Lou, "Privacy-preserving query over encrypted graph-structured data in cloud computing," 2011 International Conference on Distributed Computing Systems (ICDCS), pp. 393-402, .
[5] Y.-C. Chang, M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data," Third International Conference on Applied Cryptography and Network Security (ACNS 2015), pp. 442-455, .
[6] M. Chase, S. Kamara, "Structured encryption and controlled disclosure," Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, pp. 577-594, .
[7] R. Ciucanu, P. Lafourcade, "GOOSE: a secure framework for graph outsourcing and SPARQL evaluation," Data and Applications Security and Privacy -34th Annual IFIP WG 11.3 Conference, DBSec 2020, pp. 347-366, .
[8] Z. Cui, Z. Lu, H. Yang, Y. Zhang, S. Zhang, "A novel range search scheme based on frequent computing for edge-cloud collaborative computing in CPSS," IEEE Access, vol. 8, pp. 80599-80609, DOI: 10.1109/ACCESS.2020.2991068, 2020.
[9] Z. Cui, Z. Wu, C. Zhou, G. Gao, J. Yu, Z. Zhao, B. Wu, "An efficient subscription index for publication matching in the cloud," Knowledge-Based Systems, vol. 110, pp. 110-120, DOI: 10.1016/j.knosys.2016.07.017, 2016.
[10] R. Curtmola, J. A. Garay, S. Kamara, R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), pp. 79-88, .
[11] N. M. Donnell, E. Howley, J. Duggan, "Dynamic virtual machine consolidation using a multi-agent system to optimise energy efficiency in cloud computing," Future Generation Computer Systems, vol. 108, pp. 288-301, 2020.
[12] D. Leilei, K. Li, Q. Liu, Z. Wu, S. Zhang, "Dynamic multi-client searchable symmetric encryption with support for boolean queries," Information Sciences, vol. 506, pp. 234-257, 2020.
[13] Z. Fan, B. Choi, J. Xu, S. S. Bhowmick, "Asymmetric structure-preserving subgraph queries for large graphs," 31st IEEE International Conference on Data Engineering, ICDE 2015, pp. 339-350, .
[14] G. Gao, Z. Cui, C. Zhou, "Blind reversible authentication based on PEE and CS reconstruction," IEEE Signal Processing Letters, vol. 25 no. 7, pp. 1099-1103, DOI: 10.1109/LSP.2018.2844562, 2018.
[15] G. Gao, G. Jiang, "Bessel-fourier moment-based robust image zero-watermarking," Multimedia Tools and Applications, vol. 74 no. 3, pp. 841-858, DOI: 10.1007/s11042-013-1701-8, 2015.
[16] G. Gao, Y.-Q. Shi, "Reversible data hiding using controlled contrast enhancement and integer wavelet transform," IEEE Signal Processing Letters, vol. 22 no. 11, pp. 2078-2082, DOI: 10.1109/LSP.2015.2459055, 2015.
[17] E.-J. Goh, "Secure indexes," IACR Cryptology ePrint Archive, 2003, 2003.
[18] O. Goldreich, The Foundations of Cryptography - Volume 2: Basic Applications, 2010.
[19] S. Goldwasser, S. Micali, "Probabilistic encryption," Journal of computer and system sciences, vol. 28 no. 2, pp. 270-299, DOI: 10.1016/0022-0000(84)90070-9, 1984.
[20] R. Handa, C. R. Krishna, N. Aggarwal, "Searchable encryption: a survey on privacy-preserving search schemes on encrypted outsourced data," Concurrency and Computation: Practice and Experience, vol. 31 no. 17, 2019.
[21] L. Jiang, C. Xu, X. Wang, B. Luo, H. Wang, "Secure outsourcing SIFT: efficient and privacy-preserving image feature extraction in the encrypted domain," IEEE Transactions on Dependable and Secure Computing, vol. 17 no. 1, pp. 179-193, DOI: 10.1109/TDSC.2017.2751476, 2020.
[22] M. E. Kabir, A. N. Mahmood, H. Wang, A. K. Mustafa, "Microaggregation sorting framework for k-anonymity statistical disclosure control in cloud computing," IEEE Transactions on Cloud Computing, vol. 8 no. 2, pp. 408-417, DOI: 10.1109/TCC.2015.2469649, 2020.
[23] B. Kay, P. Date, C. D. Schuman, "Neuromorphic graph algorithms: extracting longest shortest paths and minimum spanning trees," NICE '20: Neuro-inspired Computational Elements Workshop, .
[24] B. Klimt, Y. Yang, "Introducing the enron corpus," CEAS 2004 - First Conference on Email and Anti-Spam, .
[25] J. Leskovec, K. J. Lang, A. Dasgupta, M. W. Mahoney, "Community structure in large networks: natural cluster sizes and the absence of large well-defined clusters," Internet Mathematics, vol. 6 no. 1, pp. 29-123, DOI: 10.1080/15427951.2009.10129177, 2009.
[26] W. Liao, C. Luo, S. Salinas, L. Pan, "Efficient secure outsourcing of largescale convex separable programming for big data," IEEE Transactions on Big Data, vol. 5 no. 3, pp. 368-378, DOI: 10.1109/TBDATA.2017.2787198, 2019.
[27] Z. Liu, P. Zhou, Z. Li, M. Li, "Think like a graph: real-time traffic estimation at city-scale," IEEE Transactions on Mobile Computing, vol. 18 no. 10, pp. 2446-2459, DOI: 10.1109/TMC.2018.2873642, 2019.
[28] H. Li, Y. Yang, Y. Dai, S. Yu, Y. Xiang, "Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data," IEEE Transactions on Cloud Computing, vol. 8 no. 2, pp. 484-494, DOI: 10.1109/TCC.2017.2769645, 2020.
[29] L. Li, M. Zhang, W. Hua, X. Zhou, "Fast query decomposition for batch shortest path processing in road networks," 36th IEEE International Conference on Data Engineering, ICDE 2020, pp. 1189-1200, .
[30] C. Moral, A. de Antonio, R. Imbert, J. Ramrez, "A survey of stemming algorithms in information retrieval," Information Research, vol. 19 no. 1, 2014.
[31] M. A. Rogov, A. Sedakov, "Coordinated influence on the opinions of social network members," Automation and Remote Control, vol. 81 no. 3, pp. 528-547, DOI: 10.1134/S0005117920030108, 2020.
[32] M. Shen, B. Ma, L. Zhu, R. Mijumbi, D. Xiaojiang, H. Jiankun, "Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection," IEEE Transactions on Information Forensics and Security, vol. 13 no. 4, pp. 940-953, DOI: 10.1109/TIFS.2017.2774451, 2018.
[33] D. X. Song, D. Wagner, A. Perrig, "Practical techniques for searches on encrypted data," 2000 IEEE Symposium on Security and Privacy, pp. 44-55, .
[34] S. Tahir, L. Steponkus, S. Ruj, M. Rajarajan, A. Sajjad, "A parallelized disjunctive query based searchable encryption scheme for big data," Future Generation Computer System, vol. 109, pp. 583-592, DOI: 10.1016/j.future.2018.05.048, 2020.
[35] C. Wang, N. Cao, K. Ren, W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," IEEE Transactions on parallel and distributed systems, vol. 23 no. 8, pp. 1467-1479, DOI: 10.1109/TPDS.2011.282, 2012.
[36] C. Wang, K. Ren, S. Yu, K. M. R. Urs, "Achieving usable and privacy-assured similarity search over outsourced cloud data," Proceedings of the IEEE INFOCOM, pp. 451-459, .
[37] Q. Wang, M. He, D. Minxin, S. S. M. Chow, R. W. F. Lai, Q. Zou, "Searchable encryption over feature-rich data," IEEE Transactions on Dependable and Secure Computing, vol. 15 no. 3, pp. 496-510, DOI: 10.1109/TDSC.2016.2593444, 2018.
[38] Y. Xiao, G. Gao, "Digital watermark-based independent individual certification scheme in wsns," IEEE Access, vol. 7, pp. 145516-145523, DOI: 10.1109/ACCESS.2019.2945177, 2019.
[39] Z. Zhou, M. Yan, Q. M. J. Wu, "Coverless image steganography using partial-duplicate image retrieval," Soft Computing, vol. 23 no. 13, pp. 4927-4938, DOI: 10.1007/s00500-018-3151-8, 2019.
[40] Z. Zhou, Q. J. Wu, Y. Yang, X. Sun, "Region-level visual consistency verification for large-scale partial-duplicate image search," ACM Transactions on Multimedia Computing, Communications, and Application, vol. 16 no. 2,DOI: 10.1145/3383582, 2020.
[41] C. Zygowski, A. Jaekel, "Optimal path planning strategies for monitoring coverage holes in wireless sensor networks," Ad Hoc Networks, vol. 96,DOI: 10.1016/j.adhoc.2019.101990, 2020.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2021 Bin Wu et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
The arrival of cloud computing age makes data outsourcing an important and convenient application. More and more individuals and organizations outsource large amounts of graph data to the cloud computing platform (CCP) for the sake of saving cost. As the server on CCP is not completely honest and trustworthy, the outsourcing graph data are usually encrypted before they are sent to CCP. The optimal route finding on graph data is a popular operation which is frequently used in many fields. The optimal route finding with support for semantic search has stronger query capabilities, and a consumer can use similar words of graph vertices as query terms to implement optimal route finding. Due to encrypting the outsourcing graph data before they are sent to CCP, it is not easy for data customers to manipulate and further use the encrypted graph data. In this paper, we present a solution to execute privacy-guarding optimal route finding with support for semantic search on the encrypted graph in the cloud computing scenario (PORF). We designed a scheme by building secure query index to implement optimal route finding with support for semantic search based on searchable encryption idea and stemmer mechanism. We give formal security analysis for our scheme. We also analyze the efficiency of our scheme through the experimental evaluation.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details

1 School of Computer and Big Data Science, Jiujiang University, Jiujiang, Jiangxi 332005, China
2 School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, Jiangsu 210044, China
3 School of Mathematical Information, Shaoxing University, Shaoxing, Zhejiang 312000, China