GhostDB

Querying visible and hidden data without leaks

Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, Philippe Pucheral, Dennis Shasha

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospital patients. You may want to issue queries whose result will combine private and public data, but private data must not be revealed. GhostDB is an architecture and system to achieve this. You carry private data in a smart USB key (a large Flash persistent store combined with a tamper and snoop-resistant CPU and small RAM). When the key is plugged in, you can issue queries that link private and public data and be sure that the only information revealed to a potential spy is which queries you pose. Queries linking public and private data entail novel distributed processing techniques on extremely unequal devices (standard computer and smart USB key). This paper presents the basic framework to make this all work intuitively and efficiently.

Original languageEnglish (US)
Title of host publicationSIGMOD 2007: Proceedings of the ACM SIGMOD International Conference on Management of Data
Pages677-688
Number of pages12
DOIs
StatePublished - 2007
EventSIGMOD 2007: ACM SIGMOD International Conference on Management of Data - Beijing, China
Duration: Jun 12 2007Jun 14 2007

Other

OtherSIGMOD 2007: ACM SIGMOD International Conference on Management of Data
CountryChina
CityBeijing
Period6/12/076/14/07

Fingerprint

Random access storage
Program processors
Processing

Keywords

  • Privacy
  • Secure device
  • Storage model

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Anciaux, N., Benzine, M., Bouganim, L., Pucheral, P., & Shasha, D. (2007). GhostDB: Querying visible and hidden data without leaks. In SIGMOD 2007: Proceedings of the ACM SIGMOD International Conference on Management of Data (pp. 677-688) https://doi.org/10.1145/1247480.1247555

GhostDB : Querying visible and hidden data without leaks. / Anciaux, Nicolas; Benzine, Mehdi; Bouganim, Luc; Pucheral, Philippe; Shasha, Dennis.

SIGMOD 2007: Proceedings of the ACM SIGMOD International Conference on Management of Data. 2007. p. 677-688.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Anciaux, N, Benzine, M, Bouganim, L, Pucheral, P & Shasha, D 2007, GhostDB: Querying visible and hidden data without leaks. in SIGMOD 2007: Proceedings of the ACM SIGMOD International Conference on Management of Data. pp. 677-688, SIGMOD 2007: ACM SIGMOD International Conference on Management of Data, Beijing, China, 6/12/07. https://doi.org/10.1145/1247480.1247555
Anciaux N, Benzine M, Bouganim L, Pucheral P, Shasha D. GhostDB: Querying visible and hidden data without leaks. In SIGMOD 2007: Proceedings of the ACM SIGMOD International Conference on Management of Data. 2007. p. 677-688 https://doi.org/10.1145/1247480.1247555
Anciaux, Nicolas ; Benzine, Mehdi ; Bouganim, Luc ; Pucheral, Philippe ; Shasha, Dennis. / GhostDB : Querying visible and hidden data without leaks. SIGMOD 2007: Proceedings of the ACM SIGMOD International Conference on Management of Data. 2007. pp. 677-688
@inproceedings{3d606bcec8e6428e807fd1d232494612,
title = "GhostDB: Querying visible and hidden data without leaks",
abstract = "Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospital patients. You may want to issue queries whose result will combine private and public data, but private data must not be revealed. GhostDB is an architecture and system to achieve this. You carry private data in a smart USB key (a large Flash persistent store combined with a tamper and snoop-resistant CPU and small RAM). When the key is plugged in, you can issue queries that link private and public data and be sure that the only information revealed to a potential spy is which queries you pose. Queries linking public and private data entail novel distributed processing techniques on extremely unequal devices (standard computer and smart USB key). This paper presents the basic framework to make this all work intuitively and efficiently.",
keywords = "Privacy, Secure device, Storage model",
author = "Nicolas Anciaux and Mehdi Benzine and Luc Bouganim and Philippe Pucheral and Dennis Shasha",
year = "2007",
doi = "10.1145/1247480.1247555",
language = "English (US)",
isbn = "1595936866",
pages = "677--688",
booktitle = "SIGMOD 2007: Proceedings of the ACM SIGMOD International Conference on Management of Data",

}

TY - GEN

T1 - GhostDB

T2 - Querying visible and hidden data without leaks

AU - Anciaux, Nicolas

AU - Benzine, Mehdi

AU - Bouganim, Luc

AU - Pucheral, Philippe

AU - Shasha, Dennis

PY - 2007

Y1 - 2007

N2 - Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospital patients. You may want to issue queries whose result will combine private and public data, but private data must not be revealed. GhostDB is an architecture and system to achieve this. You carry private data in a smart USB key (a large Flash persistent store combined with a tamper and snoop-resistant CPU and small RAM). When the key is plugged in, you can issue queries that link private and public data and be sure that the only information revealed to a potential spy is which queries you pose. Queries linking public and private data entail novel distributed processing techniques on extremely unequal devices (standard computer and smart USB key). This paper presents the basic framework to make this all work intuitively and efficiently.

AB - Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospital patients. You may want to issue queries whose result will combine private and public data, but private data must not be revealed. GhostDB is an architecture and system to achieve this. You carry private data in a smart USB key (a large Flash persistent store combined with a tamper and snoop-resistant CPU and small RAM). When the key is plugged in, you can issue queries that link private and public data and be sure that the only information revealed to a potential spy is which queries you pose. Queries linking public and private data entail novel distributed processing techniques on extremely unequal devices (standard computer and smart USB key). This paper presents the basic framework to make this all work intuitively and efficiently.

KW - Privacy

KW - Secure device

KW - Storage model

UR - http://www.scopus.com/inward/record.url?scp=35448952234&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=35448952234&partnerID=8YFLogxK

U2 - 10.1145/1247480.1247555

DO - 10.1145/1247480.1247555

M3 - Conference contribution

SN - 1595936866

SN - 9781595936868

SP - 677

EP - 688

BT - SIGMOD 2007: Proceedings of the ACM SIGMOD International Conference on Management of Data

ER -