Abstract
Due to the widespread of large-scale graph data and the increasing popularity of cloud computation, more and more graph processing tasks are outsourced to the cloud. Since graph data has rich information such as node information and edge information, a fundamental challenge is to minimize the overhead of subgraph matching without leakage of the sensitive information of graphs. This paper presents a survey of recent methods for privacy-preserving subgraph matching. Finally, this paper provides valuable insights and possible future directions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zou, L., Chen, L., Özsu, M.T.: K-automorphism: a general framework for privacy preserving network publication. In: VLDB (2009)
Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(05), 557–570 (2002)
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. In: ICDE, p. 24 (2006)
Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: ICDE, pp. 106–115 (2007)
Yuan, M., Chen, L., Philip, S.Y., Yu, T.: Protecting sensitive labels in social network data anonymization. TKDE 25(3), 633–647 (2013)
Fan, Z., Choi, B., Chen, Q., et al.: Structure-preserving subgraph query services. IEEE Trans. Knowl. Data Eng. 27(8), 2275–2290 (2015)
Xu, L., Choi, B., Peng, Y., et al.: A framework for privacy preserving localized graph pattern query processing. Proc. ACM Manage. Data 1(2), 1–27 (2023)
Hay, M., Miklau, G., Jensen, D., Towsley, D.F., Weis, P.: Resisting structural re-identification in anonymized social networks. PVLDB 1(1), 102–114 (2008)
Cao, N., Yang, Z., Wang, C., et al.: Privacy-preserving query over encrypted graph-structured data in cloud computing. In: 2011 31st International Conference on Distributed Computing Systems, pp. 393–402. IEEE (2011)
Lee, J., Han, W., Kasperovics, R., Lee, J.: An in-depth comparison of subgraph isomorphism algorithms in graph databases. PVLDB 6(2), 133–144 (2012)
Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: SIGMOD, pp. 93–106 (2008)
Barnhart, C., Johnson, E.L., Nemhauser, G.L., Savelsbergh, M.W., Vance, P.H.: Branch-and-price: column generation for solving huge integer programs. Oper. Res. 46(3), 316–329 (1998)
Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure KNN computation on encrypted databases. In: Proceedings of SIGMOD (2009)
Chang, Z., Zou, L., Li, F.: Privacy preserving subgraph matching on large graphs in cloud. In: Proceedings of ACM SIGMOD (2016)
Bi, F., Chang, L., Lin, X., Qin, L., Zhang, W.: Efficient subgraph matching by postponing cartesian products. In: SIGMOD, pp. 1199–1214 (2016)
Sun, Z., Wang, H., Wang, H., Shao, B., Li, J.: Efficient subgraph matching on billion node graphs. PVLDB 5(9), 788–799 (2012)
Wang, S., Zheng, Y., Jia, X., et al.: OblivGM: oblivious attributed subgraph matching as a cloud service. IEEE Trans. Inf. Forensics Secur. 17, 3582–3596 (2022)
Tai, C., Tseng, P., Yu, P.S., Chen, M.: Identity protection in sequential releases of dynamic networks. IEEE Trans. Knowl. Data Eng. 26(3), 635–651 (2014)
Huang, K., Hu, H., Zhou, S., Guan, J., Ye, Q., Zhou, X.: Privacy and efficiency guaranteed social subgraph matching. The VLDB Journal, pp. 1–22 (2021)
Du, B., Zhang, S., Cao, N., Tong, H.: First: fast interactive attributed subgraph matching. In: SIGKDD, pp. 1447–1456. ACM (2017)
Qiao, M., Zhang, H., Cheng, H.: Subgraph matching: on compression and computation. PVLDB 11(2), 176–188 (2017)
Zhou, B., Pei, J.: Preserving privacy in social networks against neighborhood attacks. In 2008 IEEE 24th International Conference on Data Engineering, pp. 506–515 (2008)
Tan, S., Knott, B., Tian, Y., Wu, D.J.: CryptGPU: fast privacypreserving machine learning on the GPU. In: Proceedings of IEEE S &P (2021)
Dauterman, E., Rathee, M., Popa, R.A., Stoica, I.: Waldo: a private time-series database from function secret sharing. In: Proceedings of IEEE S &P (2022)
Wang, S., Zheng, Y., Jia, X., Yi, X.: Privacy-preserving analytics on decentralized social graphs: The case of eigendecomposition. IEEE Trans. Knowl. Data Eng. 35, 7341–7356 (2022)
Cheng, J., Fu, A.W.-c., Liu, J.: K-isomorphism: privacy preserving network publication against structural attacks. In: SIGMOD, pp. 459–470 (2010)
Wu, W., Xiao, Y., Wang, W., He, Z., Wang, Z.: K-symmetry model for identity anonymization in social networks. In: EDBT, p. 111122 (2010)
Jiang, H., Pei, J., Yu, D., et al.: Applications of differential privacy in social network analysis: a survey. IEEE Trans. Knowl. Data Eng. 35, 108–127 (2021)
Karypis, G., Kumar, V.: Analysis of multilevel graph partitioning. In: ICS, p. 29 (1995)
Xu, J., Yi, P., Choi, B., et al.: Privacy-preserving reachability query services for massive networks. In: CIKM, pp. 145–154 (2016)
Hu, H., Xu, J., Chen, Q., et al.: Authenticating location-based services without compromising location privacy. In: SIGMOD, pp. 301–312 (2012)
Wang, S., Zheng, Y., Jia, X., et al.: PeGraph: a system for privacy-preserving and efficient search over encrypted social graphs. IEEE Trans. Inf. Forensics Secur. 17, 3179–3194 (2022)
Lai, S., Yuan, X., Sun, S.F., et al.: Graphseš: an encrypted graph database for privacy-preserving social search. In: Asia CCS 2019: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, pp. 41–54 (2019)
Lindell, Y.: Secure multiparty computation (MPC). Cryptology ePrint Archive (2020)
Araki, T., Furukawa, J., Lindell, Y., Nof, A., Ohara, K.: High-throughput semi-honest secure three-party computation with an honest majority. In: Proceedings of ACM CCS (2016)
Boyle, E., Gilboa, N., Ishai, Y.: Function secret sharing. In: Proceedings of EUROCRYPT (2015)
Zou, L., Chen, L., Özsu, M.T.: Distancejoin: pattern match query in a large graph database. PVLDB 2(1), 886–897 (2009)
Chen, W., Popa, R.A.: Metal: a metadata-hiding file-sharing system. In: Proceedings of NDSS (2020)
Sabt, M., Achemlal, M., Bouabdallah, A.: Trusted execution environment: what it is, and what it is not. In: 2015 IEEE Trustcom/BigDataSE/ISPA, pp. 57–64 (2015)
Araki, T., Furukawa, J., Ohara, K., Pinkas, B., Rosemarin, H., Tsuchida, H.: Secure graph analysis at scale. In: Proceedings of ACM CCS (2021)
Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of ACM CCS (2006)
Costan, V., Devadas, S.: Intel SGX explained, Cryptology ePrint Archive (2016)
Ding, X., Wang, C., Choo, K.K.R., et al.: A novel privacy preserving framework for large scale graph data publishing. TKDE 33(2), 331–343 (2019)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Cheng, X. et al. (2024). A Survey of Privacy Preserving Subgraph Matching Methods. In: Vaidya, J., Gabbouj, M., Li, J. (eds) Artificial Intelligence Security and Privacy. AIS&P 2023. Lecture Notes in Computer Science, vol 14509. Springer, Singapore. https://doi.org/10.1007/978-981-99-9785-5_8
Download citation
DOI: https://doi.org/10.1007/978-981-99-9785-5_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-9784-8
Online ISBN: 978-981-99-9785-5
eBook Packages: Computer ScienceComputer Science (R0)