Computation-in-Memory Accelerators for Secure Graph Database: Opportunities and Challenges

MT Arafin - 2022 27th Asia and South Pacific Design …, 2022 - ieeexplore.ieee.org
This work presents the challenges and opportunities for developing computing-in-memory
(CIM) accelerators to support secure graph databases (GDB). First, we examine the …

Secure Graph Database Search with Oblivious Filter

J Cui, C Chen, AX Liu, L Wang - Cryptology ePrint Archive, 2020 - eprint.iacr.org
With the emerging popularity of cloud computing, the problem of how to query over
cryptographically-protected data has been widely studied. However, most existing works …

SecGDB: Graph encryption for exact shortest distance queries with efficient updates

Q Wang, K Ren, M Du, Q Li, A Mohaisen - … , FC 2017, Sliema, Malta, April 3 …, 2017 - Springer
In the era of big data, graph databases have become increasingly important for NoSQL
technologies, and many systems can be modeled as graphs for semantic queries …

Graphos: Towards oblivious graph processing

JG Chamani, I Demertzis, D Papadopoulos… - Cryptology ePrint …, 2024 - eprint.iacr.org
We propose GraphOS, a system that allows a client that owns a graph database to
outsource it to an untrusted server for storage and querying. It relies on doubly-oblivious …

A privacy-preserving graph encryption scheme based on oblivious RAM

S Kane, A Bkakria - arXiv preprint arXiv:2405.19259, 2024 - arxiv.org
Graph encryption schemes play a crucial role in facilitating secure queries on encrypted
graphs hosted on untrusted servers. With applications spanning navigation systems …

Shielding graph for eXact analytics with SGX

M Du, P Jiang, Q Wang, SSM Chow… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Graphs nicely capture data from various domains, allowing the computations of many
analytic tasks via graph queries. Graphs of real-world data are often large, albeit useful, and …

Design of efficient and privacy-preserving query over graph data

Y Guan - 2023 - unbscholar.lib.unb.ca
The widespread adoption of the Internet of Things (IoT) has resulted in a vast amount of
graph data representing relationships between entities in various applications. As data …

Near-Storage Accelerator for Bulk Graph Ingestion

S Kang, SW Jun - 2023 IEEE International Parallel and …, 2023 - ieeexplore.ieee.org
Due to the ever-increasing interest in using large-scale graph analytics on important
applications including security, bioinformatics, and social network analysis, achieving high …

Making Privacy-preserving Federated Graph Analytics with Strong Guarantees Practical (for Certain Queries)

K Liu, T Gupta - arXiv preprint arXiv:2404.01619, 2024 - arxiv.org
Privacy-preserving federated graph analytics is an emerging area of research. The goal is to
run graph analytics queries over a set of devices that are organized as a graph while …

Grecs: Graph encryption for approximate shortest distance queries

X Meng, S Kamara, K Nissim, G Kollios - Proceedings of the 22nd ACM …, 2015 - dl.acm.org
We propose graph encryption schemes that efficiently support approximate shortest distance
queries on large-scale encrypted graphs. Shortest distance queries are one of the most …