2020
DOI: 10.1109/tkde.2020.3024883
|View full text |Cite
|
Sign up to set email alerts
|

GraphShield: Dynamic Large Graphs for Secure Queries with Forward Privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 45 publications
0
8
0
Order By: Relevance
“…The work [27] focuses on GNNs over decentralized spatio-temporal data, and has the clients exchange model updates with the server in cleartext. In contrast, the works [28], [29] focus on graph datasets and design There has been a line of work [31][32][33][34][35] aimed at the support for graph analytics with cryptographic methods like secure multi-party computation techniques and searchable encryption. The main focus of this line of work has been on supporting different kinds of graph queries under different scenarios in a secure manner.…”
Section: Privacy-preserving Graph Analyticsmentioning
confidence: 99%
See 2 more Smart Citations
“…The work [27] focuses on GNNs over decentralized spatio-temporal data, and has the clients exchange model updates with the server in cleartext. In contrast, the works [28], [29] focus on graph datasets and design There has been a line of work [31][32][33][34][35] aimed at the support for graph analytics with cryptographic methods like secure multi-party computation techniques and searchable encryption. The main focus of this line of work has been on supporting different kinds of graph queries under different scenarios in a secure manner.…”
Section: Privacy-preserving Graph Analyticsmentioning
confidence: 99%
“…In contrast, the works [34], [35] focus on the support for privacy-preserving shortest path queries in an outsourcing setting, where private queries need to be executed over encrypted graphs outsourced to the cloud. The work [32] designs protocols that can support privacypreserving shortest distance queries and maximum flow queries over outsourced encrypted graphs. These works rely on the combination of searchable encryption (e.g., orderrevealing encryption), homomorphic encryption, and/or garbled circuits.…”
Section: Privacy-preserving Graph Analyticsmentioning
confidence: 99%
See 1 more Smart Citation
“…After that, Niu et al [18] further proposed attribute-based encryption (ABE), which is based searchable encryption to achieve data sharing. Du et al [19] proposed a structured encryption scheme for graphs that can support other classic graph-based queries and more complicated analytics. Salmani et al [20] considered eavesdropping attack and replay attack and designed a forward security scheme with lower time complexity of deletion operation.…”
Section: Related Workmentioning
confidence: 99%
“…There are potentials to combine more functional SSE techniques, such as tree-based range search [115], [188], [189] and Boolean search [190]- [192]. Interestingly, the structured encryption [193] can encrypt and query the structured data, such as graphs, which may be adopted to solve the secure routing problem, such as the shortest distant computation [194]- [196].…”
Section: A Limitations Of the Cryptographic Toolsmentioning
confidence: 99%