Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data 2011
DOI: 10.1145/1989323.1989346
|View full text |Cite
|
Sign up to set email alerts
|

TrustedDB

Abstract: TrustedDB is an outsourced database prototype that allows clients to execute SQL queries with privacy and under regulatory compliance constraints without having to trust the service provider. TrustedDB achieves this by leveraging server-hosted tamper-proof trusted hardware in critical query processing stages.TrustedDB does not limit the query expressiveness of supported queries. And, despite the cost overhead and performance limitations of trusted hardware, the costs per query are orders of magnitude lower tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 79 publications
(3 citation statements)
references
References 47 publications
0
3
0
Order By: Relevance
“…Involvement of an authorized party requires the establishment of trust between the participants and the authority. Establishing trust with an untrusted party is not a new problem in the literature and several works in different contexts [4][5][6][7]39] rely on trusted hardware based solutions, e.g. Trusted Platform Modules (TPMs) [2] or secure co-processors [1,3], to establish a trusted computing environment, which are shown to be quite efficient for specific applications [4,6].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Involvement of an authorized party requires the establishment of trust between the participants and the authority. Establishing trust with an untrusted party is not a new problem in the literature and several works in different contexts [4][5][6][7]39] rely on trusted hardware based solutions, e.g. Trusted Platform Modules (TPMs) [2] or secure co-processors [1,3], to establish a trusted computing environment, which are shown to be quite efficient for specific applications [4,6].…”
Section: Related Workmentioning
confidence: 99%
“…We assume that the supplier of the co-processor is different than the certifier and their marketing interests do not intersect. Several privacy preserving solutions using a secure co-processor have already been proposed in different contexts such as encrypted database querying [6,7] and secure multiparty computations [25]. Our framework requires only one round of communication between the parties and the certifier.…”
Section: System Modelmentioning
confidence: 99%
See 1 more Smart Citation