






{"id":20075,"date":"2025-01-10T07:03:25","date_gmt":"2025-01-10T07:03:25","guid":{"rendered":"https:\/\/dataforpublicgood.org.in\/?p=20075"},"modified":"2025-06-27T10:39:48","modified_gmt":"2025-06-27T10:39:48","slug":"graphiti-secure-graph-computation-made-more-scalable","status":"publish","type":"post","link":"https:\/\/dataforpublicgood.org.in\/cdpg\/data-privacy\/graphiti-secure-graph-computation-made-more-scalable\/","title":{"rendered":"Graphiti: Secure Graph Computation Made More Scalable"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"20075\" class=\"elementor elementor-20075\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2dac990 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2dac990\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-51804ec\" data-id=\"51804ec\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5ac4424 elementor-widget elementor-widget-text-editor\" data-id=\"5ac4424\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p><em>December 2024<\/em><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-438085c elementor-widget elementor-widget-text-editor\" data-id=\"438085c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<h1>Graphiti: Secure Graph Computation Made More Scalable<\/h1>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff9263c elementor-widget elementor-widget-text-editor\" data-id=\"ff9263c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p style=\"color: blue;\"><strong>Authors<\/strong>: Koti, N., Kukkala, V. B., Patra, A., &amp; Raj Gopal, B.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9514863 elementor-widget elementor-widget-text-editor\" data-id=\"9514863\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>Privacy-preserving graph analysis allows performing computations on graphs that store sensitive information, while ensuring all the information about the topology of the graph as well as data associated with the nodes and edges remains hidden. The current work addresses this problem by designing a highly scalable framework, Graphiti, that allows securely realising any graph algorithm. Graphiti relies on the technique of secure multiparty computation (MPC) to design a generic framework that improves over the state-of-the-art framework of GraphSC by Araki et al. (CCS\u201921). The key technical contribution is that Graphiti has round complexity independent of the graph size, which in turn allows attaining the desired scalability. Specifically, this is achieved by (i) decoupling the Scatter primitive of GraphSC into separate operations of Propagate and ApplyE, (ii) designing a novel constant-round approach to realise Propagate, as well as (iii) designing a novel constant-round approach to realise the Gather primitive of GraphSC by leveraging the linearity of the aggregation operation. We benchmark the performance of Graphiti for the application of contact tracing via BFS for 10 hops and observe that it takes less than 2 minutes when computing over a graph of size 107. Concretely it improves over the state-of-the-art up to a factor of 1034\u00d7 in online run time. Similar to GraphSC by Araki et al., since Graphiti relies on a secure protocol for shuffle, we additionally design a shuffle protocol secure against a semi-honest adversary in the 2-party with a helper setting. Given the versatility of shuffle protocol, the designed solution is of independent interest. Hence, we also benchmark the performance of the designed shuffle where we observe improvements of up to 1.83\u00d7 in online run time when considering an input vector of size 107, in comparison to the state-of-the-art shuffle protocol in the considered setting.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85f0dee elementor-widget elementor-widget-text-editor\" data-id=\"85f0dee\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p><strong>Journal\/Conference<\/strong><\/p><p>ACM CCS 2024<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-979fd33\" data-id=\"979fd33\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ce5c30 elementor-widget elementor-widget-image\" data-id=\"4ce5c30\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/dataforpublicgood.org.in\/cdpg\/wp-content\/uploads\/2025\/01\/A-New-Era-of-Data-for-Public-Good.webp\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c27cce3 elementor-button-success elementor-align-center elementor-widget elementor-widget-button\" data-id=\"c27cce3\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3658644.3670393\" target=\"_blank\" class=\"elementor-button-link elementor-button elementor-size-sm elementor-animation-shrink\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Know more<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3d308ba elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3d308ba\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e1458bc\" data-id=\"e1458bc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5229c9c elementor-widget elementor-widget-html\" data-id=\"5229c9c\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\n    .post-style-3 .entry-header {\n        display: none;\n    }\n    \n    h1 {\n        font-size:28px !important;\n        text-transform: inherit !important;\n    }\n    \n<\/style>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div>","protected":false},"excerpt":{"rendered":"<p>December 2024 Graphiti: Secure Graph Computation Made More Scalable Authors: Koti, N., Kukkala, V. B., Patra, A., &amp; Raj Gopal, B. Privacy-preserving graph analysis allows performing computations on graphs that store sensitive information, while ensuring all the information about the topology of the graph as well as data associated with the nodes and edges remains hidden. The current work addresses &hellip;<\/p>\n","protected":false},"author":2,"featured_media":19956,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[92],"tags":[],"class_list":["post-20075","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-privacy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.12 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Graphiti: Secure Graph Computation Made More Scalable - Data for Public Good<\/title>\n<meta name=\"description\" content=\"Privacy-preserving graph analysis allows performing computations on graphs that store sensitive information, while ensuring all the information about the topology of the graph as well as data associated with the nodes and edges remains hidden.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dataforpublicgood.org.in\/cdpg\/data-privacy\/graphiti-secure-graph-computation-made-more-scalable\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Graphiti: Secure Graph Computation Made More Scalable - Data for Public Good\" \/>\n<meta property=\"og:description\" content=\"Privacy-preserving graph analysis allows performing computations on graphs that store sensitive information, while ensuring all the information about the topology of the graph as well as data associated with the nodes and edges remains hidden.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dataforpublicgood.org.in\/cdpg\/data-privacy\/graphiti-secure-graph-computation-made-more-scalable\/\" \/>\n<meta property=\"og:site_name\" content=\"Data for Public Good\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-10T07:03:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-27T10:39:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dataforpublicgood.org.in\/cdpg\/wp-content\/uploads\/2025\/01\/A-New-Era-of-Data-for-Public-Good.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"CDPG\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AgriDataXchange\" \/>\n<meta name=\"twitter:site\" content=\"@AgriDataXchange\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CDPG\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dataforpublicgood.org.in\/cdpg\/data-privacy\/graphiti-secure-graph-computation-made-more-scalable\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dataforpublicgood.org.in\/cdpg\/data-privacy\/graphiti-secure-graph-computation-made-more-scalable\/\"},\"author\":{\"name\":\"CDPG\",\"@id\":\"https:\/\/dataforpublicgood.org.in\/#\/schema\/person\/c521da9a85ddb366900e8ab41c092fb4\"},\"headline\":\"Graphiti: Secure Graph Computation Made More Scalable\",\"datePublished\":\"2025-01-10T07:03:25+00:00\",\"dateModified\":\"2025-06-27T10:39:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dataforpublicgood.org.in\/cdpg\/data-privacy\/graphiti-secure-graph-computation-made-more-scalable\/\"},\"wordCount\":323,\"publisher\":{\"@id\":\"https:\/\/dataforpublicgood.org.in\/#organization\"},\"articleSection\":[\"Data Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dataforpublicgood.org.in\/cdpg\/data-privacy\/graphiti-secure-graph-computation-made-more-scalable\/\",\"url\":\"https:\/\/dataforpublicgood.org.in\/cdpg\/data-privacy\/graphiti-secure-graph-computation-made-more-scalable\/\",\"name\":\"Graphiti: Secure Graph Computation Made More Scalable - Data for Public Good\",\"isPartOf\":{\"@id\":\"https:\/\/dataforpublicgood.org.in\/#website\"},\"datePublished\":\"2025-01-10T07:03:25+00:00\",\"dateModified\":\"2025-06-27T10:39:48+00:00\",\"description\":\"Privacy-preserving graph analysis allows performing computations on graphs that store sensitive information, while ensuring all the information about the topology of the graph as well as data associated with the nodes and edges remains hidden.\",\"breadcrumb\":{\"@id\":\"https:\/\/dataforpublicgood.org.in\/cdpg\/data-privacy\/graphiti-secure-graph-computation-made-more-scalable\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dataforpublicgood.org.in\/cdpg\/data-privacy\/graphiti-secure-graph-computation-made-more-scalable\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dataforpublicgood.org.in\/cdpg\/data-privacy\/graphiti-secure-graph-computation-made-more-scalable\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dataforpublicgood.org.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Graphiti: Secure Graph Computation Made More Scalable\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dataforpublicgood.org.in\/#website\",\"url\":\"https:\/\/dataforpublicgood.org.in\/\",\"name\":\"Data for Public Good\",\"description\":\"Data for Public Good\",\"publisher\":{\"@id\":\"https:\/\/dataforpublicgood.org.in\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dataforpublicgood.org.in\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dataforpublicgood.org.in\/#organization\",\"name\":\"Data for Public Good\",\"url\":\"https:\/\/dataforpublicgood.org.in\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dataforpublicgood.org.in\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/adex.org.in\/wp-content\/uploads\/2022\/12\/adex-logo.png\",\"contentUrl\":\"https:\/\/adex.org.in\/wp-content\/uploads\/2022\/12\/adex-logo.png\",\"width\":720,\"height\":270,\"caption\":\"Data for Public Good\"},\"image\":{\"@id\":\"https:\/\/dataforpublicgood.org.in\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/twitter.com\/AgriDataXchange\",\"https:\/\/www.linkedin.com\/company\/agricultural-data-exchange\/?viewAsMember=true\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/dataforpublicgood.org.in\/#\/schema\/person\/c521da9a85ddb366900e8ab41c092fb4\",\"name\":\"CDPG\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dataforpublicgood.org.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/07c2cc51f2149e714f30055318fd3fbb92c6e503091ab59827d9bd261e19342a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/07c2cc51f2149e714f30055318fd3fbb92c6e503091ab59827d9bd261e19342a?s=96&d=mm&r=g\",\"caption\":\"CDPG\"},\"url\":\"https:\/\/dataforpublicgood.org.in\/cdpg\/author\/iudx\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Graphiti: Secure Graph Computation Made More Scalable - Data for Public Good","description":"Privacy-preserving graph analysis allows performing computations on graphs that store sensitive information, while ensuring all the information about the topology of the graph as well as data associated with the nodes and edges remains hidden.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dataforpublicgood.org.in\/cdpg\/data-privacy\/graphiti-secure-graph-computation-made-more-scalable\/","og_locale":"en_US","og_type":"article","og_title":"Graphiti: Secure Graph Computation Made More Scalable - Data for Public Good","og_description":"Privacy-preserving graph analysis allows performing computations on graphs that store sensitive information, while ensuring all the information about the topology of the graph as well as data associated with the nodes and edges remains hidden.","og_url":"https:\/\/dataforpublicgood.org.in\/cdpg\/data-privacy\/graphiti-secure-graph-computation-made-more-scalable\/","og_site_name":"Data for Public Good","article_published_time":"2025-01-10T07:03:25+00:00","article_modified_time":"2025-06-27T10:39:48+00:00","og_image":[{"width":800,"height":600,"url":"https:\/\/dataforpublicgood.org.in\/cdpg\/wp-content\/uploads\/2025\/01\/A-New-Era-of-Data-for-Public-Good.webp","type":"image\/webp"}],"author":"CDPG","twitter_card":"summary_large_image","twitter_creator":"@AgriDataXchange","twitter_site":"@AgriDataXchange","twitter_misc":{"Written by":"CDPG","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dataforpublicgood.org.in\/cdpg\/data-privacy\/graphiti-secure-graph-computation-made-more-scalable\/#article","isPartOf":{"@id":"https:\/\/dataforpublicgood.org.in\/cdpg\/data-privacy\/graphiti-secure-graph-computation-made-more-scalable\/"},"author":{"name":"CDPG","@id":"https:\/\/dataforpublicgood.org.in\/#\/schema\/person\/c521da9a85ddb366900e8ab41c092fb4"},"headline":"Graphiti: Secure Graph Computation Made More Scalable","datePublished":"2025-01-10T07:03:25+00:00","dateModified":"2025-06-27T10:39:48+00:00","mainEntityOfPage":{"@id":"https:\/\/dataforpublicgood.org.in\/cdpg\/data-privacy\/graphiti-secure-graph-computation-made-more-scalable\/"},"wordCount":323,"publisher":{"@id":"https:\/\/dataforpublicgood.org.in\/#organization"},"articleSection":["Data Privacy"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/dataforpublicgood.org.in\/cdpg\/data-privacy\/graphiti-secure-graph-computation-made-more-scalable\/","url":"https:\/\/dataforpublicgood.org.in\/cdpg\/data-privacy\/graphiti-secure-graph-computation-made-more-scalable\/","name":"Graphiti: Secure Graph Computation Made More Scalable - Data for Public Good","isPartOf":{"@id":"https:\/\/dataforpublicgood.org.in\/#website"},"datePublished":"2025-01-10T07:03:25+00:00","dateModified":"2025-06-27T10:39:48+00:00","description":"Privacy-preserving graph analysis allows performing computations on graphs that store sensitive information, while ensuring all the information about the topology of the graph as well as data associated with the nodes and edges remains hidden.","breadcrumb":{"@id":"https:\/\/dataforpublicgood.org.in\/cdpg\/data-privacy\/graphiti-secure-graph-computation-made-more-scalable\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dataforpublicgood.org.in\/cdpg\/data-privacy\/graphiti-secure-graph-computation-made-more-scalable\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dataforpublicgood.org.in\/cdpg\/data-privacy\/graphiti-secure-graph-computation-made-more-scalable\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dataforpublicgood.org.in\/"},{"@type":"ListItem","position":2,"name":"Graphiti: Secure Graph Computation Made More Scalable"}]},{"@type":"WebSite","@id":"https:\/\/dataforpublicgood.org.in\/#website","url":"https:\/\/dataforpublicgood.org.in\/","name":"Data for Public Good","description":"Data for Public Good","publisher":{"@id":"https:\/\/dataforpublicgood.org.in\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dataforpublicgood.org.in\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dataforpublicgood.org.in\/#organization","name":"Data for Public Good","url":"https:\/\/dataforpublicgood.org.in\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dataforpublicgood.org.in\/#\/schema\/logo\/image\/","url":"https:\/\/adex.org.in\/wp-content\/uploads\/2022\/12\/adex-logo.png","contentUrl":"https:\/\/adex.org.in\/wp-content\/uploads\/2022\/12\/adex-logo.png","width":720,"height":270,"caption":"Data for Public Good"},"image":{"@id":"https:\/\/dataforpublicgood.org.in\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/twitter.com\/AgriDataXchange","https:\/\/www.linkedin.com\/company\/agricultural-data-exchange\/?viewAsMember=true"]},{"@type":"Person","@id":"https:\/\/dataforpublicgood.org.in\/#\/schema\/person\/c521da9a85ddb366900e8ab41c092fb4","name":"CDPG","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dataforpublicgood.org.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/07c2cc51f2149e714f30055318fd3fbb92c6e503091ab59827d9bd261e19342a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/07c2cc51f2149e714f30055318fd3fbb92c6e503091ab59827d9bd261e19342a?s=96&d=mm&r=g","caption":"CDPG"},"url":"https:\/\/dataforpublicgood.org.in\/cdpg\/author\/iudx\/"}]}},"_links":{"self":[{"href":"https:\/\/dataforpublicgood.org.in\/cdpg\/wp-json\/wp\/v2\/posts\/20075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dataforpublicgood.org.in\/cdpg\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dataforpublicgood.org.in\/cdpg\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dataforpublicgood.org.in\/cdpg\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/dataforpublicgood.org.in\/cdpg\/wp-json\/wp\/v2\/comments?post=20075"}],"version-history":[{"count":20,"href":"https:\/\/dataforpublicgood.org.in\/cdpg\/wp-json\/wp\/v2\/posts\/20075\/revisions"}],"predecessor-version":[{"id":22589,"href":"https:\/\/dataforpublicgood.org.in\/cdpg\/wp-json\/wp\/v2\/posts\/20075\/revisions\/22589"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dataforpublicgood.org.in\/cdpg\/wp-json\/wp\/v2\/media\/19956"}],"wp:attachment":[{"href":"https:\/\/dataforpublicgood.org.in\/cdpg\/wp-json\/wp\/v2\/media?parent=20075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dataforpublicgood.org.in\/cdpg\/wp-json\/wp\/v2\/categories?post=20075"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dataforpublicgood.org.in\/cdpg\/wp-json\/wp\/v2\/tags?post=20075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}