4.8 Article

Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 9, Issue 4, Pages 2761-2777

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3092185

Keywords

Graph clustering; homomorphic encryption; privacy-preserving method; structural information; structure entropy

Funding

  1. Key Program of the National Natural Science Union Foundation of China [U1836205, U1905211]
  2. National Natural Science Foundation of China [61662009, 61772008, 61872088]
  3. Science and Technology Major Support Program of Guizhou Province [20183001]
  4. Ministry of Education-China Mobile Research Fund Project [MCM20170401]
  5. Science and Technology Program of Guizhou Province [20191098]
  6. Project of High-Level Innovative Talents of Guizhou Province [20206008]
  7. Innovative Talent Team of Guizhou Ordinary Colleges and Universities [[2013]09]
  8. Project of Innovative Group in Guizhou Education Department [[2013]09]
  9. Natural Science Foundation of Fujian Province [2019J01276]

Ask authors/readers for more resources

This paper presents a graph clustering privacy-preserving method based on structure entropy, which protects private information and ensures accurate mining results. Experimental evaluation shows that this method has higher efficiency and reliability.
Decoding the real structure from the Social Internet-of-Things (SIoT) network with a large-scale noise structure plays a fundamental role in data mining. Protecting private information from leakage in the mining process and obtaining accurate mining results is a significant challenge. To tackle this issue, we present a graph clustering privacy-preserving method based on structure entropy, which combines data mining with the structural information theory. Specially, user private information in SIoT is encrypted by Brakerski-Gentry-Vaikuntanathan (BGV) homomorphism to generate a graph structure in the ciphertext state, the ciphertext graph structure is then divided into different modules by applying a 2-D structural information solution algorithm and a entropy reduction principle node module partition algorithm, and the K-dimensional structural information solution algorithm is utilized to further cluster the internal nodes of the partition module. Moreover, normalized structural information and network node partition similarity are introduced to analyze the correctness and similarity degree of clustering results. Finally, security analysis and theoretical analysis indicate that this scheme not only guarantees the correctness of the clustering results but also improves the security of private information in SIoT. Experimental evaluation and analysis shows that the clustering results of this scheme have higher efficiency and reliability.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available