EnclaveDB: A secure database using SGX

C Priebe, K Vaswani, M Costa - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
We propose EnclaveDB, a database engine that guarantees confidentiality, integrity, and
freshness for data and queries. EnclaveDB guarantees these properties even when the …

Security and privacy implications on database systems in big data era: A survey

GD Samaraweera, JM Chang - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
For over many decades, relational database model has been considered as the leading
model for data storage and management. However, as the Big Data explosion has …

Security and privacy for big data: A systematic literature review

B Nelson, T Olovsson - … conference on big data (big data), 2016 - ieeexplore.ieee.org
Big data is currently a hot research topic, with four million hits on Google scholar in October
2016. One reason for the popularity of big data research is the knowledge that can be …

Hardware acceleration of compression and encryption in SAP HANA

M Chiosa, F Maschi, I Müller… - Proceedings of the …, 2022 - research-collection.ethz.ch
With the advent of cloud computing, where computational resources are expensive and data
movement needs to be secured and minimized, database management systems need to …

A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends

F Zafar, A Khan, SUR Malik, M Ahmed, A Anjum… - Computers & …, 2017 - Elsevier
Cloud computing has gained tremendous popularity in recent years. By outsourcing
computation and storage requirements to public providers and paying for the services used …

{M2R}: Enabling stronger privacy in {MapReduce} computation

TTA Dinh, P Saxena, EC Chang, BC Ooi… - 24th USENIX Security …, 2015 - usenix.org
New big-data analysis platforms can enable distributed computation on encrypted data by
utilizing trusted computing primitives available in commodity server hardware. We study …

VeDB: A software and hardware enabled trusted relational database

X Yang, R Zhang, C Yue, Y Liu, BC Ooi, Q Gao… - Proceedings of the …, 2023 - dl.acm.org
Blockchain-like ledger databases emerge in recent years as a more efficient alternative to
permissioned blockchains. Conventional ledger databases mostly rely on authenticated …

Adore: Differentially oblivious relational database operators

L Qin, R Jayaram, E Shi, Z Song, D Zhuo… - arXiv preprint arXiv …, 2022 - arxiv.org
There has been a recent effort in applying differential privacy on memory access patterns to
enhance data privacy. This is called differential obliviousness. Differential obliviousness is a …

Health data cooperatives–citizen empowerment

E Hafen, D Kossmann, A Brand - Methods of information in …, 2014 - thieme-connect.com
Introduction: This article is part of a Focus Theme of Methods of Information in Medicine on
Health Record Banking. Background: Healthcare is often ineffective and costs are steadily …

Secure yannakakis: Join-aggregate queries over private data

Y Wang, K Yi - Proceedings of the 2021 International Conference on …, 2021 - dl.acm.org
In this paper, we describe a secure version of the classical Yannakakis algorithm for
computing free-connex join-aggregate queries. This protocol can be used in the secure two …