Language-Integrated Privacy-Aware Distributed Queries

被引:1
作者
Salvaneschi, Guido [1 ]
Koehler, Mirko [1 ]
Sokolowski, Daniel [1 ]
Haller, Philipp [2 ]
Erdweg, Sebastian [3 ]
Mezini, Mira [1 ]
机构
[1] Tech Univ Darmstadt, Darmstadt, Germany
[2] KTH Royal Inst Technol, Stockholm, Sweden
[3] Johannes Gutenberg Univ Mainz, Mainz, Germany
来源
PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL | 2019年 / 3卷 / OOPSLA期
关键词
Data Privacy; SQL; Information-Flow Type System; Operator Placement; Scala;
D O I
10.1145/3360593
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Distributed query processing is an effective means for processing large amounts of data. To abstract from the technicalities of distributed systems, algorithms for operator placement automatically distribute sequential data queries over the available processing units. However, current algorithms for operator placement focus on performance and ignore privacy concerns that arise when handling sensitive data. We present a new methodology for privacy-aware operator placement that both prevents leakage of sensitive information and improves performance. Crucially, our approach is based on an information-flow type system for data queries to reason about the sensitivity of query subcomputations. Our solution unfolds in two phases. First, placement space reduction generates deployment candidates based on privacy constraints using a syntax-directed transformation driven by the information-flow type system. Second, constraint solving selects the best placement among the candidates based on a cost model that maximizes performance. We verify that our algorithm preserves the sequential behavior of queries and prevents leakage of sensitive data. We implemented the type system and placement algorithm for a new query language SecQL and demonstrate significant performance improvements in benchmarks.
引用
收藏
页数:30
相关论文
共 59 条
  • [11] Cheney J, 2013, ACM SIGPLAN NOTICES, V48, P403, DOI [10.1145/2500365.2500586, 10.1145/2544174.2500586]
  • [12] Cherniack Mitch, 2003, CIDR AS CA
  • [13] Copeland G., 1984, SIGMOD Record, V14, P316, DOI 10.1145/971697.602300
  • [14] Cruz Raimil, 2017, V7, P27
  • [15] Deployment strategies for distributed complex event processing
    Cugola, Gianpaolo
    Margara, Alessandro
    [J]. COMPUTING, 2013, 95 (02) : 129 - 156
  • [16] MapReduce: A Flexible Data Processing Tool
    Dean, Jeffrey
    Ghemawat, Sanjay
    [J]. COMMUNICATIONS OF THE ACM, 2010, 53 (01) : 72 - 77
  • [17] LATTICE MODEL OF SECURE INFORMATION-FLOW
    DENNING, DE
    [J]. COMMUNICATIONS OF THE ACM, 1976, 19 (05) : 236 - 243
  • [18] CERTIFICATION OF PROGRAMS FOR SECURE INFORMATION-FLOW
    DENNING, DE
    DENNING, PJ
    [J]. COMMUNICATIONS OF THE ACM, 1977, 20 (07) : 504 - 513
  • [19] Security and privacy aspects in MapReduce on clouds: A survey
    Derbeko, Philip
    Dolev, Shlomi
    Gudes, Ehud
    Sharma, Shantanu
    [J]. COMPUTER SCIENCE REVIEW, 2016, 20 (20) : 1 - 28
  • [20] An Authorization Model for Multi Provider Queries
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Jajodia, Sushil
    Livraga, Giovanni
    Paraboschi, Stefano
    Samarati, Pierangela
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2017, 11 (03): : 256 - 268