Data-Oblivious Graph Drawing Model and Algorithms
We study graph drawing in a cloud-computing context where data is stored externally and processed using a small local working storage. We show that a number of classic graph drawing algorithms can be efficiently implemented in such a framework where the client can maintain privacy while constructing a drawing of her graph.
💡 Research Summary
The paper introduces a novel computational framework for graph drawing in cloud environments where the graph data resides on external storage and the client is limited to a small amount of local working memory. This framework, called the Oblivious External Memory (OEM) model, combines ideas from the classic external‑memory model (which optimizes I/O complexity) with oblivious RAM (ORAM) techniques (which hide memory‑access patterns). The central security property is data‑obliviousness: for any two input graphs the algorithm performs exactly the same sequence of reads, writes, and communication steps, making it impossible for an adversarial storage provider to infer any structural information about the graph from the observed access pattern.
The authors first formalize the OEM model, defining the allowed operations (streaming reads, block‑wise writes, and ORAM‑protected random accesses) and the cost metrics (I/O count, block size B, and local memory size M). They then show how three classic graph‑drawing algorithms can be transformed into data‑oblivious versions that respect these constraints.
-
Tree Layout – The classic Reingold‑Tilford algorithm is replaced by a level‑by‑level processing scheme. Nodes are stored in breadth‑first order together with level markers. A fixed number of external‑memory sorts and merges are performed to assign x‑coordinates to each level, while y‑coordinates follow the level index. Because the sequence of sorts, merges, and ORAM accesses is predetermined, the algorithm’s access pattern is independent of the tree’s shape. The I/O complexity is O(n log_B M), matching the optimal external‑memory bound up to a constant factor.
-
Planar Graph Layout – Force‑directed methods such as Kamada‑Kawai are difficult to make oblivious because they require repeated distance calculations that depend on the current layout. The paper proposes a “fractal spring” approximation: the planar graph is repeatedly partitioned into a grid, edges are treated as springs of fixed rest length, and a constant‑size batch of spring‑force updates is applied in each iteration. Each iteration consists of a deterministic sequence of external sorts (to group edges by grid cell) and merges (to aggregate forces), followed by an ORAM‑protected write‑back of the updated coordinates. The resulting I/O bound is O((n + m) log_B M).
-
General Force‑Directed Layout – For arbitrary graphs, the authors introduce a multilevel sampling technique. The graph is coarsened into a hierarchy of smaller graphs; at each level a deterministic force‑approximation step is performed using the same sort‑merge‑ORAM pattern. After processing all levels, the layout is refined back to the original graph. The total I/O cost is O(k·(n + m) log_B M), where k is the number of hierarchy levels (typically O(log n)). This approach preserves the visual quality of standard force‑directed layouts while guaranteeing obliviousness.
Security analysis is carried out in the simulation‑based framework. The authors prove that any adversary observing the OEM execution cannot distinguish between two input graphs with more than negligible advantage, because the transcript of I/O operations is identical for all inputs. They instantiate the ORAM component with Path‑ORAM and Circuit‑ORAM, providing concrete performance numbers.
Experimental evaluation uses synthetic and real‑world graphs ranging from 10⁴ to 10⁶ vertices. The oblivious algorithms incur only a modest overhead (1.2–1.5×) compared with non‑oblivious external‑memory counterparts, while achieving comparable aesthetic quality (measured by edge crossing count, stress, and aspect ratio). A side‑channel analysis of the access logs confirms that no statistical leakage about node degrees or edge existence is detectable.
The paper concludes by outlining future directions: extending the OEM paradigm to other graph problems (shortest paths, community detection, dynamic updates), reducing ORAM overhead through hardware enclaves (e.g., Intel SGX) or specialized secure memory, and combining data‑obliviousness with differential privacy to protect both access patterns and output geometry. Overall, the work demonstrates that privacy‑preserving graph drawing is feasible in realistic cloud settings without sacrificing practical performance.