SEGC-PP: structure entropy-based graph clustering algorithm for privacy preservation in social internet of things Online publication date: Wed, 08-May-2024
by Rahul; Venkatesh; M. Karthik; K.R. Venugopal; Satish B. Basapur
International Journal of Information and Computer Security (IJICS), Vol. 23, No. 3, 2024
Abstract: The results of data analysis depend solely on the techniques that extract essential information from the underlying structure of SIoT with huge uncertainty of data embedded in it. Extracting structural essential information and preserving private sensitive information in SIoT is hindering the knowledge discovery process. The methods proposed in this research paper extracts original and essential structural information from a set of IoT objects and a set of social relations in SIoT. From extracted essential structural information, user sensitive and private information are encrypted using a homomorphic encryption algorithm to produce a graph structure in an encrypted state. The degree of information exchange between graph nodes and the node-optimal module partition method are used to divide the encrypted graph structure into several modules. Further, a k-dimensional essential information algorithm is used to cluster nodes in the module. Normalised essential information, residual uncertainty, and clustering similarity algorithms are used to evaluate the correctness and similarity in clustering results. The simulation experiment results demonstrate results of SIoT graph structure clustering in ciphertext state have better efficiency and scalability. In conclusion, theoretical and security analyses demonstrate that the proposed model produces correct clustering results.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Information and Computer Security (IJICS):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com