4.8 Article

Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 9, 期 4, 页码 2761-2777

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3092185

关键词

Graph clustering; homomorphic encryption; privacy-preserving method; structural information; structure entropy

资金

  1. Key Program of the National Natural Science Union Foundation of China [U1836205, U1905211]
  2. National Natural Science Foundation of China [61662009, 61772008, 61872088]
  3. Science and Technology Major Support Program of Guizhou Province [20183001]
  4. Ministry of Education-China Mobile Research Fund Project [MCM20170401]
  5. Science and Technology Program of Guizhou Province [20191098]
  6. Project of High-Level Innovative Talents of Guizhou Province [20206008]
  7. Innovative Talent Team of Guizhou Ordinary Colleges and Universities [[2013]09]
  8. Project of Innovative Group in Guizhou Education Department [[2013]09]
  9. Natural Science Foundation of Fujian Province [2019J01276]

向作者/读者索取更多资源

This paper presents a graph clustering privacy-preserving method based on structure entropy, which protects private information and ensures accurate mining results. Experimental evaluation shows that this method has higher efficiency and reliability.
Decoding the real structure from the Social Internet-of-Things (SIoT) network with a large-scale noise structure plays a fundamental role in data mining. Protecting private information from leakage in the mining process and obtaining accurate mining results is a significant challenge. To tackle this issue, we present a graph clustering privacy-preserving method based on structure entropy, which combines data mining with the structural information theory. Specially, user private information in SIoT is encrypted by Brakerski-Gentry-Vaikuntanathan (BGV) homomorphism to generate a graph structure in the ciphertext state, the ciphertext graph structure is then divided into different modules by applying a 2-D structural information solution algorithm and a entropy reduction principle node module partition algorithm, and the K-dimensional structural information solution algorithm is utilized to further cluster the internal nodes of the partition module. Moreover, normalized structural information and network node partition similarity are introduced to analyze the correctness and similarity degree of clustering results. Finally, security analysis and theoretical analysis indicate that this scheme not only guarantees the correctness of the clustering results but also improves the security of private information in SIoT. Experimental evaluation and analysis shows that the clustering results of this scheme have higher efficiency and reliability.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据