SMCQL: Secure Querying for Federated Databases

被引:81
作者
Bater, Johes [1 ]
Elliott, Gregory [1 ]
Eggen, Craig [1 ]
Goel, Satyender [1 ]
Kho, Abel [1 ]
Rogers, Jennie [1 ]
机构
[1] Northwestern Univ, Evanston, IL 60208 USA
来源
PROCEEDINGS OF THE VLDB ENDOWMENT | 2017年 / 10卷 / 06期
关键词
LANGUAGE;
D O I
10.14778/3055330.3055334
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
People and machines are collecting data at an unprecedented rate. Despite this newfound abundance of data, progress has been slow in sharing it for open science, business, and other data-intensive endeavors. Many such efforts are stymied by privacy concerns and regulatory compliance issues. For example, many hospitals are interested in pooling their medical records for research, but none may disclose arbitrary patient records to researchers or other healthcare providers. In this context we propose the Private Data Network (PDN), a federated database for querying over the collective data of mutually distrustful parties. In a PDN, each member database does not reveal its tuples to its peers nor to the query writer. Instead, the user submits a query to an honest broker that plans and coordinates its execution over multiple private databases using secure multiparty computation (SMC). Here, each database's query execution is oblivious, and its program counters and memory traces are agnostic to the inputs of others. We introduce a framework for executing PDN queries named SMCQL. This system translates SQL statements into SMC primitives to compute query results over the union of its source databases without revealing sensitive information about individual tuples to peer data providers or the honest broker. Only the honest broker and the querier receive the results of a PDN query. For fast, secure query evaluation, we explore a heuristics-driven optimizer that minimizes the PDN's use of secure computation and partitions its query evaluation into scalable slices.
引用
收藏
页码:673 / 684
页数:12
相关论文
共 36 条
  • [1] Aggarwal Gagan., 2005, CIDR
  • [2] Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
  • [3] Al-Lawati A., 2005, PROC ACM SIGMOD WORK, P59, DOI DOI 10.1145/1077501.1077513
  • [4] [Anonymous], USENIX SEC S
  • [5] [Anonymous], 1987, 19 ACM STOC, DOI [DOI 10.1145/28395.28420, 10.1145/28395.28420]
  • [6] Bogdanov, 2016, T424 CYB AS
  • [7] Chaudhuri S., 1998, Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems. PODS 1998, P34, DOI 10.1145/275487.275492
  • [8] Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
  • [9] Chow S. S., 2009, NDSS
  • [10] Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1