{"title":"PMkR: Privacy-preserving multi-keyword top-k reachability query","authors":"Ting Xu, Xinrui Ge, Changheng Shao","doi":"10.1016/j.cose.2025.104525","DOIUrl":null,"url":null,"abstract":"<div><div>Privacy-preserving reachability query can determine whether one vertex is reachable from another vertex, which is applied in many domains. Due to the growing size of graphs, more and more users upload blinded graphs to the cloud, which can reduce the computation and storage burden for users. While privacy-preserving reachability query schemes have been proposed, they do not consider the keyword information in vertices. In this paper, we propose a privacy-preserving multi-keyword top-<span><math><mi>k</mi></math></span> reachability query scheme (PM<span><math><mi>k</mi></math></span>R), which can find <span><math><mi>k</mi></math></span> vertices nearest to the source vertex, and containing the given keywords. In order to achieve the multi-keyword reachability query, we build the secure indexes based on the 2-hop labeling and the balanced binary tree. The 2-hop labeling index can help quickly determine whether two vertices are reachable and the distance between them. We convert the inclusion relationship between vertices and keywords into vectors, and store in the tree index. We use the secure Euclidean distance calculation to protect data privacy, which can judge whether the vertices contain the query keywords by secure inner product computation. To avoid the cloud learning the correspondence between vertices in the tree index and 2-hop index, we perform two-layer blinding on the vertices. The security analysis and extensive experiments on real-world datasets show that our scheme is secure and efficient.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"156 ","pages":"Article 104525"},"PeriodicalIF":4.8000,"publicationDate":"2025-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825002147","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Privacy-preserving reachability query can determine whether one vertex is reachable from another vertex, which is applied in many domains. Due to the growing size of graphs, more and more users upload blinded graphs to the cloud, which can reduce the computation and storage burden for users. While privacy-preserving reachability query schemes have been proposed, they do not consider the keyword information in vertices. In this paper, we propose a privacy-preserving multi-keyword top- reachability query scheme (PMR), which can find vertices nearest to the source vertex, and containing the given keywords. In order to achieve the multi-keyword reachability query, we build the secure indexes based on the 2-hop labeling and the balanced binary tree. The 2-hop labeling index can help quickly determine whether two vertices are reachable and the distance between them. We convert the inclusion relationship between vertices and keywords into vectors, and store in the tree index. We use the secure Euclidean distance calculation to protect data privacy, which can judge whether the vertices contain the query keywords by secure inner product computation. To avoid the cloud learning the correspondence between vertices in the tree index and 2-hop index, we perform two-layer blinding on the vertices. The security analysis and extensive experiments on real-world datasets show that our scheme is secure and efficient.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.