Large graph datasets have become invaluable assets for studying problems in business applications and scientific research. These datasets, collected and owned by data owners, may also contain privacy-sensitive information. When using public clouds for elastic processing, data owners have to protect both data ownership and privacy from curious cloud providers. We propose a cloud-centric framework that allows data owners to efficiently collect graph data from the distributed data contributors, and privately store and analyze graph data in the cloud. Data owners can conduct expensive operations in untrusted public clouds with privacy and scalability preserved. The major contributions of this work include two privacy-preserving approximate eige...
Data is one of the most valuable assets for organization. It can facilitate users or organizations t...
Data is one of the most valuable assets for organization. It can facilitate users or organizations t...
Security issues have given rise to immerging an active area of research due to the many security thr...
Large graph datasets have become invaluable assets for studying problems in business applications an...
Big graphs, such as user interactions in social networks and customer rating matrices in collaborati...
© 2019 Leyla RoohiThere are many examples of graph-structured data, like records of friendships in s...
Abstract—Conventional private data publication schemes are targeted at publication of sensitive data...
Abstract — In the emerging cloud computing paradigm, data owners become increasingly motivated to ou...
Conventional private data publication schemes are targeted at publication of sensitive datasets with...
The wide presence of large graph data and the increasing popularity of storing data in the cloud dri...
The growing popularity of storing large data graphs in cloud has inspired the emergence of subgraph ...
International audienceGraph processing is a popular computing model for big data analytics. Emerging...
Click on the DOI link to access the article (may not be free).Today's society is collecting a massiv...
Cloud computing provides powerful and economical infrastructural resources for cloud users to handle...
Many graph mining and analysis services have been de-ployed on the cloud, which can alleviate users ...
Data is one of the most valuable assets for organization. It can facilitate users or organizations t...
Data is one of the most valuable assets for organization. It can facilitate users or organizations t...
Security issues have given rise to immerging an active area of research due to the many security thr...
Large graph datasets have become invaluable assets for studying problems in business applications an...
Big graphs, such as user interactions in social networks and customer rating matrices in collaborati...
© 2019 Leyla RoohiThere are many examples of graph-structured data, like records of friendships in s...
Abstract—Conventional private data publication schemes are targeted at publication of sensitive data...
Abstract — In the emerging cloud computing paradigm, data owners become increasingly motivated to ou...
Conventional private data publication schemes are targeted at publication of sensitive datasets with...
The wide presence of large graph data and the increasing popularity of storing data in the cloud dri...
The growing popularity of storing large data graphs in cloud has inspired the emergence of subgraph ...
International audienceGraph processing is a popular computing model for big data analytics. Emerging...
Click on the DOI link to access the article (may not be free).Today's society is collecting a massiv...
Cloud computing provides powerful and economical infrastructural resources for cloud users to handle...
Many graph mining and analysis services have been de-ployed on the cloud, which can alleviate users ...
Data is one of the most valuable assets for organization. It can facilitate users or organizations t...
Data is one of the most valuable assets for organization. It can facilitate users or organizations t...
Security issues have given rise to immerging an active area of research due to the many security thr...