A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM

AI-generated keywords: Graph Encryption Secure Queries Untrusted Servers Oblivious RAM Trusted Execution Environment

AI-generated Key Points

  • Graph encryption schemes play a critical role in enabling secure queries on encrypted graphs stored on untrusted servers.
  • Existing methods have vulnerabilities that can disclose elements of the graph structure and query patterns, jeopardizing security and privacy.
  • The authors propose a novel graph encryption scheme integrating oblivious RAM and trusted execution environment techniques to address these vulnerabilities.
  • The primary objectives of their solution are to keep adversaries unaware of any information about the underlying graph and achieve query indistinguishability by concealing access patterns.
  • The paper discusses cryptographic techniques like Fully Homomorphic Encryption (FHE) and secure Multi-Party Computation (MPC), which offer high security but low efficiency.
  • Solutions that trade off some security for improved efficiency by allowing controlled leakage are also mentioned.
  • Reference is made to Ghosh, Kamara, and Tamassia's practical graph encryption scheme supporting shortest path queries with a balanced trade-off between efficiency and security.
  • The research contributes valuable insights into enhancing graph encryption schemes for heightened security while balancing efficiency considerations.
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Seyni Kane, Anis Bkakria

License: CC BY 4.0

Abstract: Graph encryption schemes play a crucial role in facilitating secure queries on encrypted graphs hosted on untrusted servers. With applications spanning navigation systems, network topology, and social networks, the need to safeguard sensitive data becomes paramount. Existing graph encryption methods, however, exhibit vulnerabilities by inadvertently revealing aspects of the graph structure and query patterns, posing threats to security and privacy. In response, we propose a novel graph encryption scheme designed to mitigate access pattern and query pattern leakage through the integration of oblivious RAM and trusted execution environment techniques, exemplified by a Trusted Execution Environment (TEE). Our solution establishes two key security objectives: (1) ensuring that adversaries, when presented with an encrypted graph, remain oblivious to any information regarding the underlying graph, and (2) achieving query indistinguishability by concealing access patterns. Additionally, we conducted experimentation to evaluate the efficiency of the proposed schemes when dealing with real-world location navigation services.

Submitted to arXiv on 29 May. 2024

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2405.19259v1

In this paper, the authors Seyni Kane and Anis Bkakria delve into the realm of graph encryption schemes. They emphasize the critical role of such schemes in enabling secure queries on encrypted graphs stored on untrusted servers. The applications of these schemes are vast and range from navigation systems to social networks, highlighting the necessity to protect sensitive data. However, existing methods have been found to possess vulnerabilities that inadvertently disclose elements of the graph structure and query patterns, jeopardizing security and privacy. To address these vulnerabilities, the authors propose a novel graph encryption scheme that integrates oblivious RAM and trusted execution environment techniques. This is exemplified through a Trusted Execution Environment (TEE). The primary objectives of their solution are twofold: firstly, ensuring that adversaries presented with an encrypted graph remain unaware of any information pertaining to the underlying graph; and secondly, achieving query indistinguishability by concealing access patterns. Furthermore, the authors conducted experiments to assess the efficiency of their proposed schemes in real-world scenarios involving location navigation services. They highlight the challenges in designing secure, expressive, and efficient graph encryption schemes while discussing cryptographic techniques like Fully Homomorphic Encryption (FHE) and secure Multi-Party Computation (MPC). These techniques offer high security but low efficiency. The paper also touches upon solutions that trade off some security for improved efficiency by allowing controlled leakage. The paper references Ghosh, Kamara, and Tamassia's (GKT) practical graph encryption scheme supporting shortest path queries with a balanced trade-off between efficiency and security. This scheme encrypts graphs using a recursive algorithm that partitions nodes based on connectivity patterns. In conclusion, this research contributes valuable insights into enhancing graph encryption schemes for heightened security while balancing efficiency considerations. By addressing access pattern and query pattern leakage through innovative techniques like oblivious RAM integration and TEE utilization, the proposed scheme holds promise for safeguarding sensitive data in various applications effectively.
Created on 06 Jun. 2024

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.