Design and Analysis of Graph Encryption Schemes
Abstract
With the advent of cloud storage and computing, the related privacy issues have attracted the attention of researchers. This has resulted in the development of encrypted databases which can be queried without the server learning the content of the database or of the queries. Although provably secure by some definitions, such schemes rely on a trade-off between security and efficiency and thus leak a controlled amount of information to the server. The analysis of the various types of leakages has evolved in parallel to the development of new schemes and has revealed important potential attacks.
In this Master’s thesis, we focus on encrypted databases designed for data in the form of graphs such as social networks or web graphs. Since the leakage resulting from encrypted graph databases has not yet been subject to thorough anaylsis we explore this topic. More specifically, we consider schemes running shortest path queries on graphs and in particular encrypted sketch-based distance oracles like the GRECS scheme introduced by Meng et al. in ACM CCS 2015. To our knowledge, the sketch pattern leakage occuring in this type of construction has not yet been analysed.
Based on two different algorithms to build distance sketches, we investigate how much information the sketch pattern reveals about the sketches themselves. Using our observations, we explore potential attacks which could be mounted by a malicious server. In particular, we propose a query recovery attack feasible by an attacker with partial database knowledge. Our results show that the sketch pattern leakage can reveal sensitive information to the server and we propose a modification to the sketching algorithm to mitigate the impact of the sketch pattern leakage on privacy.
Type
Publication
Master Thesis at ETH Zurich