2022
DOI: 10.1109/tifs.2022.3210881
|View full text |Cite
|
Sign up to set email alerts
|

OblivGM: Oblivious Attributed Subgraph Matching as a Cloud Service

Abstract: In recent years there has been growing popularity of leveraging cloud computing for storing and querying attributed graphs, which have been widely used to model complex structured data in various applications. Such trend of outsourced graph analytics, however, is accompanied with critical privacy concerns regarding the information-rich and proprietary attributed graph data. In light of this, we design, implement, and evaluate OblivGM, a new system aimed at oblivious graph analytics services outsourced to the c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 56 publications
(94 reference statements)
0
6
0
Order By: Relevance
“…Reference [15] uses a depth-first search code as a canonical tagging system, and on the basis of this code, a new graph similarity measure algorithm is proposed in combination with Levenshtein distance (i.e., string editing distance), which has a complexity of n 3 modulo exponential operation. Reference [16] designed secure graph isomorphism and similarity determination algorithms based on hash functions, which measure computational complexity by comparing the number of hash operations, and it has a complexity of 6h (h is the number of operations to perform one hash operation).…”
Section: Computational Complexitymentioning
confidence: 99%
See 4 more Smart Citations
“…Reference [15] uses a depth-first search code as a canonical tagging system, and on the basis of this code, a new graph similarity measure algorithm is proposed in combination with Levenshtein distance (i.e., string editing distance), which has a complexity of n 3 modulo exponential operation. Reference [16] designed secure graph isomorphism and similarity determination algorithms based on hash functions, which measure computational complexity by comparing the number of hash operations, and it has a complexity of 6h (h is the number of operations to perform one hash operation).…”
Section: Computational Complexitymentioning
confidence: 99%
“…Communication complexity is usually measured in terms of communication rounds. Reference [15] requires six rounds of interaction to complete the computation, Reference [16] requires four rounds, Algorithm 1 in this paper requires one round of communication, and Algorithm 2 requires three rounds of communication to complete the computation. Table 1 shows a comparison of the performance.…”
Section: Communication Complexitymentioning
confidence: 99%
See 3 more Smart Citations