database. Here, the data owner uploads the graph data
to the cloud in a certain format: it is divided into three
pieces and sent to separate locations in the cloud in
encrypted form. All of these components are regarded
as multi-party, and none of them can independently
know the entire graph, a query, or its result. Addi-
tionally, the AES algorithm is used to encrypt every
message sent between them.
Although SMPC has been used in relational
databases and graph databases in the past, multi-party
queries over graph databases are new. We, there-
fore, suggested a system called SMPQ. It helps to
secure multi-party computation on graph databases.
In order to conduct queries over graph databases,
the SMPQ uses SMPC protocols. To show how well
an SMPC query performed on a graph database, we
implemented a prototype top on the Conclave system.
Table 5 compares our proposed system, SMPQ, to all
of the earlier systems.
7 CONCLUSION AND FUTURE
WORK
In this paper, we have proposed a system for se-
cure joint querying over federated graph databases
based on secure multiparty computation (SMPC) pro-
tocols called SMPQ. We implemented our system us-
ing Conclave and enhanced a query’s execution time
until it was as close as possible to that of Neo4j Fab-
ric. Furthermore, we expanded our system to be fully
automatic and handle more queries than it did pre-
viously by using the Neo4j Fabric functionality ex-
tended with the APOC library. The current system
remains to be tested on some Cypher query language,
which was beyond the scope of this paper, such as
a correlated query, and we have yet to add support
for dealing with different databases separately. In fu-
ture work, we will extend this system to handle traver-
sal queries between all databases using SMPC proto-
cols. Furthermore, we intend to reduce the overheads
of SMPQ by removing Conclave and instead directly
connecting to the JIFF server to apply SMPC proto-
cols.
REFERENCES
Al-Juaid, N., Lisitsa, A., and Schewe, S. (2022). SMPG:
Secure multi party computation on graph databases.
In ICISSP, pages 463–471.
Albab, K. D., Issa, R., Lapets, A., Flockhart, P., Qin, L.,
and Globus-Harris, I. (2019). Tutorial: Deploying se-
cure multi-party computation on the web using JIFF.
In 2019 IEEE Cybersecurity Development (SecDev),
pages 3–3. IEEE.
Alwen, J., Ostrovsky, R., Zhou, H., and Zikas, V. (2015).
Incoercible multi-party computation and universally
composable receipt-free voting. In Advances in
Cryptology–CRYPTO 2015: 35th Annual Cryptology
Conference,, volume 9216, pages 763–780. Springer
Berlin Heidelberg.
Aly, A. and Van Vyve, M. (2016). Practically efficient
secure single-commodity multi-market auctions. In
International Conference on Financial Cryptography
and Data Security, pages 110–129. Springer.
Bater, J., Elliott, G., Eggen, C., Goel, S., Kho, A., and
Rogers, J. (2016). SMCQL: secure querying for fed-
erated databases. arXiv preprint arXiv:1606.06808.
Bater, J., He, X., Ehrich, W., Machanavajjhala, A., and
Rogers, J. (2018). Shrinkwrap: efficient sql query pro-
cessing in differentially private data federations. Pro-
ceedings of the VLDB Endowment, 12(3):307–320.
Bater, J., Park, Y., He, X., Wang, X., and Rogers, J.
(2020). SAQE: practical privacy-preserving approx-
imate query processing for data federations. Proceed-
ings of the VLDB Endowment, 13(12):2691–2705.
Ciucanu, R. and Lafourcade, P. (2020). GOOSE: A se-
cure framework for graph outsourcing and sparql eval-
uation. In 34th Annual IFIP WG 11.3 Conference
on Data and Applications Security and Privacy (DB-
Sec’20). Accept
´
e,
`
a para
ˆ
ıtre.
Cramer, R., Damg
˚
ard, I. B., and Nielsen, J. B. (2015). Se-
cure multiparty computation. Cambridge University
Press.
Evans, D., Kolesnikov, V., and Rosulek, M. (2018). A prag-
matic introduction to secure multi-party computation.
Found. Trends Priv. Secur., 2:70–246.
Francis, N., Green, A., Guagliardo, P., Libkin, L., Lin-
daaker, T., Marsault, V., Plantikow, S., Rydberg, M.,
Selmer, P., and Taylor, A. (2018). Cypher: An evolv-
ing query language for property graphs. In Proceed-
ings of the 2018 International Conference on Manage-
ment of Data, pages 1433–1445.
Gu, Z., Corcoglioniti, F., Lanti, D., Mosca, A., Xiao, G.,
Xiong, J., and Calvanese, D. (2022). A systematic
overview of data federation systems.
He, Z., Wong, W. K., Kao, B., Cheung, D., Li, R., Yiu, S.,
and Lo, E. (2015). SDB: A secure query processing
system with data interoperability. Proc. VLDB En-
dow., 8:1876–1879.
inpher.io. What is secret computing? https://inpher.io/
technology/what-is-secure-multiparty-computation.
Accessed: 2022-06-23.
Liagouris, J., Kalavri, V., Faisal, M., and Varia, M. (2021).
Secrecy: Secure collaborative analytics on secret-
shared data. arXiv preprint arXiv:2102.01048.
L
´
opez, F. M. S. and De La Cruz, E. G. S. (2015). Liter-
ature review about Neo4j graph database as a feasi-
ble alternative for replacing rdbms. Industrial Data,
18(2):135–139.
Miller, J. J. (2013). Graph database applications and con-
cepts with Neo4j. In Proceedings of the Southern
ICISSP 2023 - 9th International Conference on Information Systems Security and Privacy
216