{"id":"https://openalex.org/W3130332527","doi":"https://doi.org/10.1109/comsnets51098.2021.9352809","title":"Securely Computing Clustering Coefficient for Outsourced Dynamic Encrypted Graph Data","display_name":"Securely Computing Clustering Coefficient for Outsourced Dynamic Encrypted Graph Data","publication_year":2021,"publication_date":"2021-01-05","ids":{"openalex":"https://openalex.org/W3130332527","doi":"https://doi.org/10.1109/comsnets51098.2021.9352809","mag":"3130332527"},"language":"en","primary_location":{"id":"doi:10.1109/comsnets51098.2021.9352809","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets51098.2021.9352809","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001052421","display_name":"Laltu Sardar","orcid":"https://orcid.org/0000-0002-7433-0497"},"institutions":[{"id":"https://openalex.org/I6498739","display_name":"Indian Statistical Institute","ror":"https://ror.org/00q2w1j53","country_code":"IN","type":"education","lineage":["https://openalex.org/I6498739"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Laltu Sardar","raw_affiliation_strings":["Indian Statistical Institute, Kolkata, India"],"affiliations":[{"raw_affiliation_string":"Indian Statistical Institute, Kolkata, India","institution_ids":["https://openalex.org/I6498739"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067158200","display_name":"Gaurav Bansal","orcid":"https://orcid.org/0000-0002-0775-5225"},"institutions":[{"id":"https://openalex.org/I4210127441","display_name":"Indian Institute of Technology Jammu","ror":"https://ror.org/02f0vsw63","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210127441"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Gaurav Bansal","raw_affiliation_strings":["Indian Institute of Technology, Jammu, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology, Jammu, India","institution_ids":["https://openalex.org/I4210127441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032506814","display_name":"Sushmita Ruj","orcid":"https://orcid.org/0000-0002-8698-6709"},"institutions":[{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I6498739","display_name":"Indian Statistical Institute","ror":"https://ror.org/00q2w1j53","country_code":"IN","type":"education","lineage":["https://openalex.org/I6498739"]},{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]}],"countries":["AU","IN"],"is_corresponding":false,"raw_author_name":"Sushmita Ruj","raw_affiliation_strings":["CSIRO Data61, Australia","Indian Statistical Institute, Kolkata, India"],"affiliations":[{"raw_affiliation_string":"CSIRO Data61, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]},{"raw_affiliation_string":"Indian Statistical Institute, Kolkata, India","institution_ids":["https://openalex.org/I6498739"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001126368","display_name":"Kouichi Sakurai","orcid":"https://orcid.org/0000-0003-4621-1674"},"institutions":[{"id":"https://openalex.org/I135598925","display_name":"Kyushu University","ror":"https://ror.org/00p4k0j84","country_code":"JP","type":"education","lineage":["https://openalex.org/I135598925"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kouichi Sakurai","raw_affiliation_strings":["Kyushu University, Fukuoka, Japan"],"affiliations":[{"raw_affiliation_string":"Kyushu University, Fukuoka, Japan","institution_ids":["https://openalex.org/I135598925"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5001052421"],"corresponding_institution_ids":["https://openalex.org/I6498739"],"apc_list":null,"apc_paid":null,"fwci":0.136,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.50736316,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"abs 1409 5021","issue":null,"first_page":"465","last_page":"473"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8135901093482971},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7972397208213806},{"id":"https://openalex.org/keywords/clustering-coefficient","display_name":"Clustering coefficient","score":0.706481397151947},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.6404518485069275},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.638436496257782},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5944316983222961},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.49035048484802246},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.48181596398353577},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.43953919410705566},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.43585556745529175},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.41630297899246216},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2852475047111511},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.13026973605155945},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08184894919395447}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8135901093482971},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7972397208213806},{"id":"https://openalex.org/C22047676","wikidata":"https://www.wikidata.org/wiki/Q898680","display_name":"Clustering coefficient","level":3,"score":0.706481397151947},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.6404518485069275},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.638436496257782},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5944316983222961},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.49035048484802246},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.48181596398353577},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.43953919410705566},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.43585556745529175},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.41630297899246216},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2852475047111511},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.13026973605155945},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08184894919395447},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comsnets51098.2021.9352809","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets51098.2021.9352809","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W138613892","https://openalex.org/W1539859404","https://openalex.org/W1608459536","https://openalex.org/W1822655612","https://openalex.org/W1912202910","https://openalex.org/W2045446661","https://openalex.org/W2063575624","https://openalex.org/W2102415185","https://openalex.org/W2112090702","https://openalex.org/W2146828512","https://openalex.org/W2175971604","https://openalex.org/W2295684855","https://openalex.org/W2526481299","https://openalex.org/W2585802332","https://openalex.org/W2649616373","https://openalex.org/W2755088640","https://openalex.org/W2770638201","https://openalex.org/W2781469847","https://openalex.org/W2944600096","https://openalex.org/W2947881777","https://openalex.org/W2949411814","https://openalex.org/W2952166355","https://openalex.org/W2963484628","https://openalex.org/W2965783709","https://openalex.org/W3007623546","https://openalex.org/W3101858276","https://openalex.org/W6605677989","https://openalex.org/W6638475069","https://openalex.org/W6661689412","https://openalex.org/W6685869566","https://openalex.org/W6697561230","https://openalex.org/W6739756882","https://openalex.org/W6763035460"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2358200898"],"abstract_inverted_index":{"Social":[0],"networks":[1],"are":[2],"represented":[3],"by":[4,70],"graphs.":[5,164],"Clustering":[6],"coefficient":[7,22,131],"is":[8,28,96,171,196],"a":[9,24,51,100,122,179,200],"measure":[10],"of":[11,23,65,148,153,181],"how":[12],"closely":[13],"knit":[14],"the":[15,20,26,32,74,83,93,133,146,168,182,194],"actors":[16],"are.":[17],"The":[18,137,189],"higher":[19],"clustering":[21,130],"node,":[25],"more":[27],"its":[29],"importance":[30],"in":[31],"network.":[33],"When":[34],"small":[35],"enterprises,":[36],"with":[37],"low":[38],"storage":[39],"and":[40,48,68,142,184],"computational":[41],"power,":[42],"want":[43],"to":[44,50,59,77,82,89,98,105],"outsource":[45],"their":[46],"data":[47,61,66,75,79,112],"computation":[49],"third-party":[52],"cloud,":[53],"anonymization":[54],"alone":[55],"might":[56],"not":[57,156],"help":[58],"protect":[60],"privacy.":[62],"Moreover,":[63,176],"fear":[64],"leak":[67],"misuse":[69],"unauthorized":[71],"parties":[72],"force":[73],"owner":[76],"encrypt":[78],"before":[80,160],"outsourcing":[81],"cloud.":[84],"This":[85],"makes":[86],"it":[87],"difficult":[88],"perform":[90],"queries":[91,104,154],"on":[92,108,132,162,186],"data.":[94,188],"It":[95],"necessary":[97],"design":[99,121],"technique":[101,126],"that":[102,127,167,193],"allows":[103,128],"be":[106],"performed":[107],"encrypted":[109,135,163],"outsourced":[110,134],"graph":[111,124],"without":[113],"leaking":[114],"meaningful":[115],"information.":[116],"In":[117],"this":[118],"paper,":[119],"we":[120,177],"novel":[123],"encryption":[125,138],"calculating":[129],"graph.":[136],"also":[139],"supports":[140],"edge":[141],"neighborhood":[143],"queries.":[144],"To":[145],"best":[147],"our":[149],"knowledge,":[150],"these":[151],"types":[152],"have":[155],"been":[157],"possible":[158],"together":[159],"efficiently":[161],"We":[165],"show":[166,192],"designed":[169],"scheme":[170,183,195],"secure":[172],"under":[173],"chosen-query":[174],"attack.":[175],"implement":[178],"prototype":[180],"test":[185],"real-life":[187],"implementation":[190],"results":[191],"practical":[197],"even":[198],"for":[199],"large":[201],"database.":[202]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
