Many graph mining and analysis services have been de-ployed on the cloud, which can alleviate users from the burden of implementing and maintaining graph algo-rithms. However, putting graph analytics on the cloud can invade users ’ privacy. To solve this problem, we propose CryptGraph, which runs graph analytics on en-crypted graph to preserve the privacy of both users’ graph data and the analytic results. In CryptGraph, users encrypt their graphs before uploading them to the cloud. Cloud runs graph analysis on the encrypted graphs and obtains results which are also in encrypted form that the cloud cannot decipher. The encrypted results are sent back to users and users do the decryption to get the plaintext results. In this process, users ’...
In the real world, graph structured data is ubiquitous. For example, social networks, communications...
The arrival of cloud computing age makes data outsourcing an important and convenient application. M...
The work presented in this thesis is concerned with the database security aspects. In particular, we...
Abstract — In the emerging cloud computing paradigm, data owners become increasingly motivated to ou...
Confidential algorithm for the approximate graph vertex covering problem is presented in this articl...
Big graphs, such as user interactions in social networks and customer rating matrices in collaborati...
© 2019 Leyla RoohiThere are many examples of graph-structured data, like records of friendships in s...
Confidential algorithm for the approximate graph vertex covering problem is presented in this articl...
With the emerging popularity of cloud computing, the problem of how to query over cryptographically-...
Graph pattern matching (GPM) is an important operation on graph computation. Most existing work assu...
Large graph datasets have become invaluable assets for studying problems in business applications an...
Graph-structured data is pervasive. Modeling large-scale network-structured datasets require graph p...
The wide presence of large graph data and the increasing popularity of storing data in the cloud dri...
Graph data are extensively utilized in social networks, collaboration networks, geo-social networks,...
Outsourcing data and computation to the cloud is increasingly common. However, the data to be outsou...
In the real world, graph structured data is ubiquitous. For example, social networks, communications...
The arrival of cloud computing age makes data outsourcing an important and convenient application. M...
The work presented in this thesis is concerned with the database security aspects. In particular, we...
Abstract — In the emerging cloud computing paradigm, data owners become increasingly motivated to ou...
Confidential algorithm for the approximate graph vertex covering problem is presented in this articl...
Big graphs, such as user interactions in social networks and customer rating matrices in collaborati...
© 2019 Leyla RoohiThere are many examples of graph-structured data, like records of friendships in s...
Confidential algorithm for the approximate graph vertex covering problem is presented in this articl...
With the emerging popularity of cloud computing, the problem of how to query over cryptographically-...
Graph pattern matching (GPM) is an important operation on graph computation. Most existing work assu...
Large graph datasets have become invaluable assets for studying problems in business applications an...
Graph-structured data is pervasive. Modeling large-scale network-structured datasets require graph p...
The wide presence of large graph data and the increasing popularity of storing data in the cloud dri...
Graph data are extensively utilized in social networks, collaboration networks, geo-social networks,...
Outsourcing data and computation to the cloud is increasingly common. However, the data to be outsou...
In the real world, graph structured data is ubiquitous. For example, social networks, communications...
The arrival of cloud computing age makes data outsourcing an important and convenient application. M...
The work presented in this thesis is concerned with the database security aspects. In particular, we...