Outsourced Analysis of Encrypted Graphs in the Cloud with Privacy Protection
International Journal of Electrical and Electronics Engineering |
© 2023 by SSRG - IJEEE Journal |
Volume 10 Issue 1 |
Year of Publication : 2023 |
Authors : D. Selvaraj, S. M. Udhaya Sankar, D. Dhinakaran, T. P. Anish |
How to Cite?
D. Selvaraj, S. M. Udhaya Sankar, D. Dhinakaran, T. P. Anish, "Outsourced Analysis of Encrypted Graphs in the Cloud with Privacy Protection," SSRG International Journal of Electrical and Electronics Engineering, vol. 10, no. 1, pp. 53-62, 2023. Crossref, https://doi.org/10.14445/23488379/IJEEE-V10I1P105
Abstract:
Huge diagrams have unique properties for organizations and research, such as client linkages in informal organizations and customer evaluation lattices in social channels. They necessitate a lot of financial assets to maintain because they are large and frequently continue to expand. Owners of large diagrams may need to use cloud resources due to the extensive arrangement of open cloud resources to increase capacity and computation flexibility. However, the cloud's accountability and protection of schematics have become a significant issue. In this study, we consider calculations for security savings for essential graph examination practices: schematic extraterrestrial examination for outsourcing graphs in the cloud server. We create the security-protecting variants of the two proposed Eigen decay computations. They are using two cryptographic algorithms: additional substance homomorphic encryption (ASHE) strategies and some degree homomorphic encryption (SDHE) methods. Inadequate networks also feature a distinctively confidential info adaptation convention to allow the trade-off between secrecy and data sparseness. Both dense and sparse structures are investigated. According to test results, calculations with sparse encoding can drastically reduce information. SDHE-based strategies have reduced computing time, while ASHE-based methods have reduced stockpiling expenses.
Keywords:
Cloud, Protection, Outsourcing data, Homomorphic encryption, Eigen deterioration.
References:
[1] Xianrui Meng et al., “GRECS: Graph Encryption for Approximate Shortest Distance Queries,” Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 504–517, 2015. Crossref, https://doi.org/10.1145/2810103.2813672
[2] M. Naehrig, K. Lauter, and V. Vaikuntanathan, “Can Homomorphic Encryption Be Practical?,” Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, pp. 113–124, 2011.
[3] Cong Wang et al., “Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations,” 2011 31st International Conference on Distributed Computing Systems, pp. 549–558, 2011. Crossref, https://doi.org/10.1109/ICDCS.2011.41
[4] D. Dhinakaran, and P. M. Joe Prathap, "Protection of Data Privacy From Vulnerability Using Two-Fish Technique with Apriori Algorithm in Data Mining," The Journal of Supercomputing, vol. 78, no. 16, pp. 17559–17593, 2022. Crossref, https://doi.org/10.1007/S11227-022-04517-0
[5] Lingaswami, and G. Avinash Reddy, “Offensive Decoy Technology for Cloud Data Attacks,” International Journal of P2P Network Trends and Technology, vol. 3, no. 6, pp. 23–27, 2013.
[6] D. Dhinakaran, and P. M. Joe Prathap, “Preserving Data Confidentiality in Association Rule Mining Using Data Share Allocator Algorithm,” Intelligent Automation & Soft Computing, vol. 33, no. 3, pp. 1877–1892, 2022. Crossref, https://doi.org/10.32604/Iasc.2022.024509
[7] Raphaël Bost et al., “Machine Learning Classification Over Encrypted Data,” Annual Network and Distributed System Security Symposium, 2015.
[8] B. Murugeshwari et al., "Trust Aware Privacy Preserving Routing Protocol for Wireless Adhoc Network," International Journal of Engineering Trends and Technology, vol. 70, no. 9, pp. 362-370, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I9P236
[9] Hongwei Li et al., “Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data,” IEEE Transactions on Cloud Computing, vol. 8, no. 2, pp. 484–494, 2020. Crossref, https://doi.org/10.1109/TCC.2017.2769645
[10] Pawan Jaybhaye, and Dr. Bandu B. Meshram, "Malware Detection and Prevention on Cloud," International Journal of Computer and Organization Trends, vol. 9, no. 4, pp. 5-10, 2019. Crossref, https://doi.org/10.14445/22492593/IJCOT-V9I4P302
[11] D. Catalano, and D. Fiore, “Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data,” ACM SIGSAC Conference on Computer and Communications Security, pp. 1518– 1529, 2015. Crossref, https://doi.org/10.1145/2810103.2813624
[12] Zongmin Cui et al., “A Novel Range Search Scheme Based on Frequent Computing for Edge-Cloud Collaborative Computing in CPSS,” IEEE Access, vol. 8, pp. 80599–80609, 2020. Crossref, https://doi.org/10.1109/ACCESS.2020.2991068
[13] Bin Wu et al., "Privacy-Guarding Optimal Route Finding with Support for Semantic Search on Encrypted Graph in Cloud Computing Scenario," Wireless Communications and Mobile Computing, 2021. Crossref, https://doi.org/10.1155/2021/6617959
[14] R. Ciucanu, and P. Lafourcade, “GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation,” Data and Applications Security and Privacy -34th Annual IFIP WG 11.3 Conference, Regensburg, Germany, pp. 347-366, 2020.
[15] Dhinakaran D et al., "Mining Privacy-Preserving Association Rules Based on Parallel Processing in Cloud Computing," International Journal of Engineering Trends and Technology, vol. 70, no. 3, pp. 284-294, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I3P232.
[16] Sravan Kumar Nalla, and Konni Srinivasarao, "An Identity Based Authentication and Data Encryption in Cloud Computing," SSRG International Journal of Computer Science and Engineering, vol. 4, no. 10, pp. 19-23, 2017. Crossref, https://doi.org/10.14445/23488387/IJCSE-V4I10P105
[17] Ming Li et al., “Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-Owner Settings,” Security and Privacy in Communication Network, Springer, pp. 89–106, 2010. Crossref, https://doi.org/10.1007/978-3-642-16161-2_6
[18] S. M. Udhaya Sankar, Mary Subaja Christo, and P. S. Uma Priyadarsini, “Secure and Energy Concise Route Revamp Technique in Wireless Sensor Networks,” Intelligent Automation and Soft Computing, vol. 35, no. 2, pp. 2337–2351, 2023. Crossref, https://doi.org/10.32604/iasc.2023.030278
[19] Dhruv Sharma, and C. Fancy, "Cloud Storage Security Using Firebase and Fernet Encryption," International Journal of Engineering Trends and Technology, vol. 70, no. 9, pp. 371-375, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I9P237
[20] K. Sudharson et al., “Hybrid Deep Learning Neural System for Brain Tumor Detection,” 2022 2nd International Conference on Intelligent Technologies, pp. 1-6, 2022. Crossref, https://doi.org/10.1109/CONIT55038.2022.9847708.
[21] S.M Udhaya Sankar, V.Vijaya Chamundeeswari, and Jeevaa Katiravan, “Identity Based Attack Detection and Manifold Adversaries Localization in Wireless Networks,” Journal of Theoretical and Applied Information Technology, vol. 67, no. 2, pp. 513-518, 2014.
[22] Ming Li et al., “Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 131–143, 2013. Crossref, https://doi.org/10.1109/TPDS.2012.97
[23] D. Dhinakaran, and P.M. Joe Prathap, "Ensuring Privacy of Data and Mined Results of Data Possessor in Collaborative ARM," Pervasive Computing and Social Networking, Springer, Singapore, vol. 317, pp. 431–444, 2022. Crossref, https://doi.org/10.1007/978- 981-16-5640-8_34
[24] T. Sujithra et al., “Id Based Adaptive-Key Signcryption for Data Security in Cloud Environment,” International Journal of Advanced Research in Engineering and Technology, vol. 11, no. 4, pp. 167-182, 2020.
[25] D.Ramya et al., "Performance Study on A Mono-Pass Solar Air Heating System (MPSAH) Under the Influence of A PCM," Materials Today: Proceedings, vol. 69, no. 3, pp. 934-938, 2022. Crossref, https://doi.org/10.1016/j.matpr.2022.07.375
[26] S. M. Udhaya Sankar et al., “Efficient Data Transmission Technique for Transmitting the Diagnosed Signals and Images in WBSN,” 4th International Conference on Recent Trends in Computer Science and Technology, pp. 251–256, 2022. Crossref, https://doi.org/10.1109/ICRTCST54752.2022.9781867
[27] Veena Gadad, and C. N. Sowmyarani, "Towards Privacy Preserving Data Publishing in Inter Cloud Infrastructure," International Journal of Engineering Trends and Technology, vol. 70, no. 10, pp. 27-34, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I10P204
[28] Hongbin Liang et al., “An SMDpbased Service Model for Interdomain Resource Allocation in Mobile Cloud Networks,” IEEE Transactions on Vehicular Technology, vol. 61, no. 5, pp. 2222–2232, 2012. Crossref, https://doi.org/10.1109/TVT.2012.2194748
[29] Qinghua Shen et al., “Exploiting Geodistributed Clouds for E-Health Monitoring System with Minimum Service Delay and Privacy Preservation,” IEEE Journal of Biomedical and Health Informatics, vol. 18, no. 2, pp. 430–439, 2014. Crossref, https://doi.org/10.1109/JBHI.2013.2292829
[30] D.Ramya et al., “Performance Study on a Mono-Pass Solar Air Heating System (MPSAH) Under the Influence of A PCM,” Materials Today: Proceedings, vol. 69, no. 3, pp. 934–938, 2022. Crossref, https://doi.org/10.1016/j.matpr.2022.07.375
[31] S.M. Udhaya Sankar et al., "Safe Routing Approach by Identifying and Subsequently Eliminating the Attacks in MANET," International Journal of Engineering Trends and Technology, vol. 70, no. 11, pp. 219-231, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I11P224.
[32] J. Aruna Jasmine et al., "A Traceability Set Up Using Digitalization of Data and Accessibility," International Conference on Intelligent Sustainable Systems (ICISS), Tirunelveli, India, pp. 907-910, 2020. Crossref, https://doi.org/10.1109/ICISS49785.2020.9315938
[33] G. Gomathy et al., "Automatic Waste Management Based on Iot Using a Wireless Sensor Network," 2022 International Conference on Edge Computing and Applications, pp. 629-634, 2022. Crossref, https://doi.org/10.1109/ICECAA55415.2022.9936351
[34] N. Dharini, Jeevaa Katiravan, and S. M. Udhaya Sankar, “Wireless Sensor Network-Based Detection of Poisonous Gases Using Principal Component Analysis,” Computer Systems Science and Engineering, vol. 44, no. 1, pp. 249–264, 2022. Crossref, https://doi.org/10.32604/csse.2023.024419
[35] Wenhai Sun et al., “Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 11, pp. 3025–3035, 2014. Crossref, https://doi.org/10.1109/TPDS.2013.282
[36] D. Dhinakaran et al., "Secure Android Location Tracking Application with Privacy Enhanced Technique," 2022 Fifth International Conference on Computational Intelligence and Communication Technologies, pp. 223-229, 2022. Crossref, https://doi.org/10.1109/Ccict56684.2022.00050
[37] Jiadi Yu et al., “Towards Secure Multikeyword Top-K Retrieval Over Encrypted Cloud Data,” IEEE Transactions on Dependable and Secure Computing, vol. 10, no. 4, pp. 239–250, 2013. Crossref, https://doi.org/10.1109/TDSC.2013.9
[38] S.M Udhaya Sankar et al., “Mobile Application Based Speech and Voice Analysis for COVID-19 Detection Using Computational Audit Techniques,” International Journal of Pervasive Computing and Communications, 2020. Crossref, https://doi.org/10.1108/IJPCC-09-2020-0150
[39] D. Dhinakaran et al., “Recommendation System for Research Studies Based on GCR,” International Mobile and Embedded Technology Conference (MECON), Noida, India, pp. 61-65, 2022. Crossref, https://doi.org/10.1109/MECON53876.2022.9751920
[40] Jena Catherine Bel D et al., “Trustworthy Cloud Storage Data Protection Based on Blockchain Technology,” 2022 International Conference on Edge Computing and Applications, pp. 538-543, 2022. Crossref, https://doi.org/10.1109/ICECAA55415.2022.9936299
[41] Ning Cao et al., “Privacy-Preserving Multikeyword Ranked Search Over Encrypted Cloud Data,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 222–233, 2014. Crossref, https://doi.org/10.1109/TPDS.2013.45
[42] S. M. Udhaya Sankar, S. Thanga Revathi, and R. Thiagarajan, "Hybrid Authentication Using Node Trustworthy to Detect Vulnerable Nodes," Computer Systems Science and Engineering, vol. 45, no. 1, pp. 625–640, 2023. Crossref, https://doi.org/10.32604/csse.2023.030444
[43] T S Arulananth et al., “Evaluation of Low Power Consumption Network on Chip Routing Architecture,” Microprocessors and Microsystems, vol. 82, 2021. Crossref, https://doi.org/10.1016/J.Micpro.2020.103809
[44] T. Sujithra et al., “Survey on Data Security in Cloud Environment,” International Journal of Advanced Research in Engineering and Technology, vol. 11, no. 4, pp. 155- 166, 2020.
[45] D. Dhinakaran et al., “Assistive System for the Blind with Voice Output Based on Optical Character Recognition,” International Conference on Innovative Computing and Communications, Lecture Notes in Networks and Systems, Springer, Singapore, vol. 492, 2023. Crossref, https://doi.org/10.1007/978-981-19-3679-1_1
[46] R. Surendiran, and K. Alagarsamy, "Privacy Conserved Access Control Enforcement in MCC Network with Multilayer Encryption," International Journal of Engineering Trends and Technology, vol. 4, no. 5, pp. 2217-2224, 2013. Crossref, https://doi.org/10.14445/22315381/IJETT-V4I5P174
[47] Yue Wang, Xintao Wu, and Leting Wu, “Differential Privacy Preserving Spectral Graph Analysis,” Advances in Knowledge Discovery and Data Mining, Springer Berlin Heidelberg, pp. 329-340, 2013. Crossref, https://doi.org/10.1007/978-3-642-37456-2_28
[48] Franziska Berger, Peter Gritzmann, and Sven de Vries, “Computing Cyclic Invariants for Molecular Graphs,” Networks, vol. 70, no. 2, pp. 116–131, 2017. Crossref, https://doi.org/10.1002/net.21757
[49] Richa Kunal Sharma, and Dr. Nalini Kant Joshi, "Security and Privacy Problems in Cloud Computing," International Journal of Computer and Organization Trends, vol. 9, no. 4, pp. 30-39, 2019. Crossref, https://doi.org/10.14445/22492593/IJCOT-V9I4P306
[50] Valeria Nikolaenko et al., “Privacy-Preserving Matrix Factorization,” ACM SIGSAC Conference on Computer and Communications Security, pp. 801–812, 2013. Crossref, https://doi.org/10.1145/2508859.2516751
[51] P. Kirubanantham et al., “An Intelligent Web Service Group-Based Recommendation System for Long-Term Composition,” The Journal of Supercomputing, vol. 78, pp. 1944–1960, 2022. Crossref, https://doi.org/10.1007/s11227-021-03930-1
[52] Leilei Du et al., “Dynamic Multiclient Searchable Symmetric Encryption with Support for Boolean Queries,” Information Sciences, vol. 506, pp. 234–257, 2020. Crossref, https://doi.org/10.1016/j.ins.2019.08.014