privacy in distributed database systems

6
Privacy in Distributed Database Systems Adam J. Lee, Panos K. Chrysanthis, Nicholas L. Farnan [email protected]

Upload: leal

Post on 24-Feb-2016

27 views

Category:

Documents


0 download

DESCRIPTION

Privacy in Distributed Database Systems. Adam J. Lee , Panos K. Chrysanthis , Nicholas L. Farnan adamlee@ cs.pitt.edu. Distributed Query Processing. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Privacy in Distributed Database Systems

Privacy in Distributed Database Systems

Adam J. Lee, Panos K. Chrysanthis, Nicholas L. [email protected]

Page 2: Privacy in Distributed Database Systems

Distributed Query Processing

SELECT * FROM Plants, Supplies, Polluted_WatersWHERE Supplies.type = "solvent", AND Supplies.name = Polluted_Waters.pollutant, AND Polluted_Waters.location = Plants.location, AND Plant.id = Supplies.plant_id;

Alice

Querier

Inventory

Facilities

Pollution WatchUntruste

dTrusted

Page 3: Privacy in Distributed Database Systems

How Does Optimization Affect Querier Privacy?

SELECT * FROM Plants, Supplies, Polluted_WatersWHERE Supplies.type = "solvent", AND Supplies.name = Polluted_Waters.pollutant, AND Polluted_Waters.location = Plants.location, AND Plant.id = Supplies.plant_id;

Reveals sensitive information to ManuCoReveals sensitive information to Pollution WatchResults in a large amount of network trafficStrikes a balance between privacy and performance

Page 4: Privacy in Distributed Database Systems

SELECT * FROM Plants, Supplies, Polluted_WatersWHERE Supplies.type = "solvent", AND Supplies.name = Polluted_Waters.pollutant, AND Polluted_Waters.location = Plants.location, AND Plant.id = Supplies.plant_id;

The 10,000 Mile View…

Make sure all operations involving these conditions are evaluated by a trusted

server!

Empower users to… Identify sensitive intensional regions within their queries Specify constraints/preferences over how these regions are

handled

Enable the system to… Consider privacy as an optimization criterion Construct query plans respecting these constraints and preferences

Page 5: Privacy in Distributed Database Systems

So where are we?

…PROOFS

Implementation within PostgreSQL

Page 6: Privacy in Distributed Database Systems

What would you do?

1. Learn flex and bison

2. Develop a parser for extracting privacy constraints from SQL queriers

3. Generate constraint/preference data structures needed for optimization

4. Integrate with our modified version of PostgreSQL