GhostDB

Hiding data from prying eyes

Christophe Salperwyck, Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, Philippe Pucheral, Dennis Shasha

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospital patients. You may want to issue queries whose result will combine private and public data, but private data must not be revealed, say, to the prying eyes of some insurance fraudster. GhostDB is an architecture and system to achieve this. You carry private data in a smart USB device (a large Flash persistent store combined with a tamper and snoop-resistant CPU and small RAM). When the key is plugged in, you can issue queries that link private and public data and be sure that the only information revealed to a potential spy is which queries you pose and the public data you access. Queries linking public and private data entail novel distributed processing techniques on extremely unequal devices (standard computer and smart USB device) in which data flows in only one direction: from public to private. This demonstration shows GhostDB's query processing in action.

Original languageEnglish (US)
Title of host publication33rd International Conference on Very Large Data Bases, VLDB 2007 - Conference Proceedings
PublisherAssociation for Computing Machinery, Inc
Pages1346-1349
Number of pages4
ISBN (Electronic)9781595936493
StatePublished - 2007
Event33rd International Conference on Very Large Data Bases, VLDB 2007 - Vienna, Austria
Duration: Sep 23 2007Sep 27 2007

Other

Other33rd International Conference on Very Large Data Bases, VLDB 2007
CountryAustria
CityVienna
Period9/23/079/27/07

Fingerprint

Query processing
Insurance
Random access storage
Program processors
Demonstrations
Processing
Query

ASJC Scopus subject areas

  • Hardware and Architecture
  • Information Systems and Management
  • Information Systems
  • Software

Cite this

Salperwyck, C., Anciaux, N., Benzine, M., Bouganim, L., Pucheral, P., & Shasha, D. (2007). GhostDB: Hiding data from prying eyes. In 33rd International Conference on Very Large Data Bases, VLDB 2007 - Conference Proceedings (pp. 1346-1349). Association for Computing Machinery, Inc.

GhostDB : Hiding data from prying eyes. / Salperwyck, Christophe; Anciaux, Nicolas; Benzine, Mehdi; Bouganim, Luc; Pucheral, Philippe; Shasha, Dennis.

33rd International Conference on Very Large Data Bases, VLDB 2007 - Conference Proceedings. Association for Computing Machinery, Inc, 2007. p. 1346-1349.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Salperwyck, C, Anciaux, N, Benzine, M, Bouganim, L, Pucheral, P & Shasha, D 2007, GhostDB: Hiding data from prying eyes. in 33rd International Conference on Very Large Data Bases, VLDB 2007 - Conference Proceedings. Association for Computing Machinery, Inc, pp. 1346-1349, 33rd International Conference on Very Large Data Bases, VLDB 2007, Vienna, Austria, 9/23/07.
Salperwyck C, Anciaux N, Benzine M, Bouganim L, Pucheral P, Shasha D. GhostDB: Hiding data from prying eyes. In 33rd International Conference on Very Large Data Bases, VLDB 2007 - Conference Proceedings. Association for Computing Machinery, Inc. 2007. p. 1346-1349
Salperwyck, Christophe ; Anciaux, Nicolas ; Benzine, Mehdi ; Bouganim, Luc ; Pucheral, Philippe ; Shasha, Dennis. / GhostDB : Hiding data from prying eyes. 33rd International Conference on Very Large Data Bases, VLDB 2007 - Conference Proceedings. Association for Computing Machinery, Inc, 2007. pp. 1346-1349
@inproceedings{246fba55e4054eada5c145dbbda02c26,
title = "GhostDB: Hiding data from prying eyes",
abstract = "Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospital patients. You may want to issue queries whose result will combine private and public data, but private data must not be revealed, say, to the prying eyes of some insurance fraudster. GhostDB is an architecture and system to achieve this. You carry private data in a smart USB device (a large Flash persistent store combined with a tamper and snoop-resistant CPU and small RAM). When the key is plugged in, you can issue queries that link private and public data and be sure that the only information revealed to a potential spy is which queries you pose and the public data you access. Queries linking public and private data entail novel distributed processing techniques on extremely unequal devices (standard computer and smart USB device) in which data flows in only one direction: from public to private. This demonstration shows GhostDB's query processing in action.",
author = "Christophe Salperwyck and Nicolas Anciaux and Mehdi Benzine and Luc Bouganim and Philippe Pucheral and Dennis Shasha",
year = "2007",
language = "English (US)",
pages = "1346--1349",
booktitle = "33rd International Conference on Very Large Data Bases, VLDB 2007 - Conference Proceedings",
publisher = "Association for Computing Machinery, Inc",

}

TY - GEN

T1 - GhostDB

T2 - Hiding data from prying eyes

AU - Salperwyck, Christophe

AU - Anciaux, Nicolas

AU - Benzine, Mehdi

AU - Bouganim, Luc

AU - Pucheral, Philippe

AU - Shasha, Dennis

PY - 2007

Y1 - 2007

N2 - Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospital patients. You may want to issue queries whose result will combine private and public data, but private data must not be revealed, say, to the prying eyes of some insurance fraudster. GhostDB is an architecture and system to achieve this. You carry private data in a smart USB device (a large Flash persistent store combined with a tamper and snoop-resistant CPU and small RAM). When the key is plugged in, you can issue queries that link private and public data and be sure that the only information revealed to a potential spy is which queries you pose and the public data you access. Queries linking public and private data entail novel distributed processing techniques on extremely unequal devices (standard computer and smart USB device) in which data flows in only one direction: from public to private. This demonstration shows GhostDB's query processing in action.

AB - Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospital patients. You may want to issue queries whose result will combine private and public data, but private data must not be revealed, say, to the prying eyes of some insurance fraudster. GhostDB is an architecture and system to achieve this. You carry private data in a smart USB device (a large Flash persistent store combined with a tamper and snoop-resistant CPU and small RAM). When the key is plugged in, you can issue queries that link private and public data and be sure that the only information revealed to a potential spy is which queries you pose and the public data you access. Queries linking public and private data entail novel distributed processing techniques on extremely unequal devices (standard computer and smart USB device) in which data flows in only one direction: from public to private. This demonstration shows GhostDB's query processing in action.

UR - http://www.scopus.com/inward/record.url?scp=85011115109&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85011115109&partnerID=8YFLogxK

M3 - Conference contribution

SP - 1346

EP - 1349

BT - 33rd International Conference on Very Large Data Bases, VLDB 2007 - Conference Proceedings

PB - Association for Computing Machinery, Inc

ER -