TY - JOUR
T1 - Authenticated Subgraph Similarity Searchin Outsourced Graph Databases
AU - Peng, Yun
AU - Fan, Zhe
AU - Choi, Byron
AU - Xu, Jianliang
AU - Bhowmick, Sourav S.
N1 - Funding Information:
This work was partly supported by General Research Fund of Hong Kong (GRF210510) and Natural Science Foundation of China (71171122). The work of Yun Peng was finished while he was pursuing his Ph.D study in the Department of Computer Science at Hong Kong Baptist University.
PY - 2015/7/1
Y1 - 2015/7/1
N2 - Subgraph similarity search is used in graph databases to retrieve graphs whose subgraphs are similar to a given query graph. It has been proven successful in a wide range of applications including bioinformatics and chem-informatics, etc. Due to the cost of providing efficient similarity search services on ever-increasing graph data, database outsourcing is apparently an appealing solution to database owners. Unfortunately, query service providers may be untrusted or compromised by attacks. To our knowledge, no studies have been carried out on the authentication of the search. In this paper, we propose authentication techniques that follow the popular filtering-and-verification framework. We propose an authentication-friendly metric index called GMTree. Specifically, we transform the similarity search into a search in a graph metric space and derive small verification objects (VOs) to-be-transmitted to query clients. To further optimize GMTree, we propose a sampling-based pivot selection method and an authenticated version of MCS computation. Our comprehensive experiments verified the effectiveness and efficiency of our proposed techniques.
AB - Subgraph similarity search is used in graph databases to retrieve graphs whose subgraphs are similar to a given query graph. It has been proven successful in a wide range of applications including bioinformatics and chem-informatics, etc. Due to the cost of providing efficient similarity search services on ever-increasing graph data, database outsourcing is apparently an appealing solution to database owners. Unfortunately, query service providers may be untrusted or compromised by attacks. To our knowledge, no studies have been carried out on the authentication of the search. In this paper, we propose authentication techniques that follow the popular filtering-and-verification framework. We propose an authentication-friendly metric index called GMTree. Specifically, we transform the similarity search into a search in a graph metric space and derive small verification objects (VOs) to-be-transmitted to query clients. To further optimize GMTree, we propose a sampling-based pivot selection method and an authenticated version of MCS computation. Our comprehensive experiments verified the effectiveness and efficiency of our proposed techniques.
KW - outsourced database
KW - query authentication
KW - Subgraph similarity search
UR - http://www.scopus.com/inward/record.url?scp=84959486037&partnerID=8YFLogxK
U2 - 10.1109/TKDE.2014.2316818
DO - 10.1109/TKDE.2014.2316818
M3 - Journal article
AN - SCOPUS:84959486037
SN - 1041-4347
VL - 27
SP - 1838
EP - 1860
JO - IEEE Transactions on Knowledge and Data Engineering
JF - IEEE Transactions on Knowledge and Data Engineering
IS - 7
M1 - 6786998
ER -