The growing popularity of storing large data graphs in cloud has inspired the emergence of subgraph pattern matching on a remote cloud, which is usually defined in terms of subgraph isomorphism. However, it is an NP-complete problem and too strict to find useful matches in certain applications. In addition, there exists another important concern, i.e., how to protect the privacy of data graphs in subgraph pattern matching without undermining matching results. To tackle these problems, we propose a novel framework to achieve the privacy-preserving subgraph pattern matching via strong simulation in cloud. Firstly, we develop a k-automorphism model based method to protect structural privacy in data graphs. Additionally, we use a cost-model bas...
Many graph mining and analysis services have been de-ployed on the cloud, which can alleviate users ...
Abstract—A fundamental problem of graph databases is subgraph isomorphism query (a.k.a subgraph quer...
Abstract—Cloud computing has become indispensable in providing highly reliable data services to user...
With the popularity of storing large data graph in cloud, the emergence of subgraph pattern matching...
The wide presence of large graph data and the increasing popularity of storing data in the cloud dri...
Big graphs, such as user interactions in social networks and customer rating matrices in collaborati...
Graph pattern matching (GPM) is an important operation on graph computation. Most existing work assu...
Large graph datasets have become invaluable assets for studying problems in business applications an...
Part 5: Privacy-Preserving TechnologiesInternational audienceGraph structured data can be found in m...
Abstract — In the emerging cloud computing paradigm, data owners become increasingly motivated to ou...
© 2019 Leyla RoohiThere are many examples of graph-structured data, like records of friendships in s...
Outsourcing data in clouds is adopted by more and more companies and individuals due to the profits ...
Abstract — As the age of big data evolves, outsourcing of data mining tasks to multi-cloud environme...
Providing a method to efficiently search into outsourced encrypted data, without forsaking strong pr...
To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privac...
Many graph mining and analysis services have been de-ployed on the cloud, which can alleviate users ...
Abstract—A fundamental problem of graph databases is subgraph isomorphism query (a.k.a subgraph quer...
Abstract—Cloud computing has become indispensable in providing highly reliable data services to user...
With the popularity of storing large data graph in cloud, the emergence of subgraph pattern matching...
The wide presence of large graph data and the increasing popularity of storing data in the cloud dri...
Big graphs, such as user interactions in social networks and customer rating matrices in collaborati...
Graph pattern matching (GPM) is an important operation on graph computation. Most existing work assu...
Large graph datasets have become invaluable assets for studying problems in business applications an...
Part 5: Privacy-Preserving TechnologiesInternational audienceGraph structured data can be found in m...
Abstract — In the emerging cloud computing paradigm, data owners become increasingly motivated to ou...
© 2019 Leyla RoohiThere are many examples of graph-structured data, like records of friendships in s...
Outsourcing data in clouds is adopted by more and more companies and individuals due to the profits ...
Abstract — As the age of big data evolves, outsourcing of data mining tasks to multi-cloud environme...
Providing a method to efficiently search into outsourced encrypted data, without forsaking strong pr...
To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privac...
Many graph mining and analysis services have been de-ployed on the cloud, which can alleviate users ...
Abstract—A fundamental problem of graph databases is subgraph isomorphism query (a.k.a subgraph quer...
Abstract—Cloud computing has become indispensable in providing highly reliable data services to user...