Outsourced Analysis of Encrypted Graphs in the Cloud with Privacy Protection

04/21/2023
by   D. Selvaraj, et al.
0

Huge diagrams have unique properties for organizations and research, such as client linkages in informal organizations and customer evaluation lattices in social channels. They necessitate a lot of financial assets to maintain because they are large and frequently continue to expand. Owners of large diagrams may need to use cloud resources due to the extensive arrangement of open cloud resources to increase capacity and computation flexibility. However, the cloud's accountability and protection of schematics have become a significant issue. In this study, we consider calculations for security savings for essential graph examination practices: schematic extraterrestrial examination for outsourcing graphs in the cloud server. We create the security-protecting variants of the two proposed Eigen decay computations. They are using two cryptographic algorithms: additional substance homomorphic encryption (ASHE) strategies and some degree homomorphic encryption (SDHE) methods. Inadequate networks also feature a distinctively confidential info adaptation convention to allow the trade-off between secrecy and data sparseness. Both dense and sparse structures are investigated. According to test results, calculations with sparse encoding can drastically reduce information. SDHE-based strategies have reduced computing time, while ASHE-based methods have reduced stockpiling expenses.

READ FULL TEXT

page 3

page 6

research
12/03/2018

Secure outsourced calculations with homomorphic encryption

With the rapid development of cloud computing, the privacy security inci...
research
02/01/2022

Securing the data in cloud using Algebra Homomorphic Encryption scheme based on updated Elgamal(AHEE)

Cloud computing is the broad and diverse phenomenon. Users are allowed t...
research
09/21/2018

Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection

Constrained shortest distance (CSD) querying is one of the fundamental g...
research
04/26/2021

Two-Server Delegation of Computation on Label-Encrypted Data

Catalano and Fiore propose a scheme to transform a linearly-homomorphic ...
research
05/12/2021

An Efficient Matrix Multiplication with Enhanced Privacy Protection in Cloud Computing and Its Applications

As one of the most important basic operations, matrix multiplication com...
research
06/14/2022

Cloud Property Graph: Connecting Cloud Security Assessments with Static Code Analysis

In this paper, we present the Cloud Property Graph (CloudPG), which brid...
research
11/01/2017

Deep and Shallow convections in Atmosphere Models on Intel Xeon Phi Coprocessor Systems

Deep and shallow convection calculations occupy significant times in atm...

Please sign up or login with your details

Forgot password? Click here to reset