Secure data processing on sensitive data using trusted hardware

Methods, systems, and computer-readable media are directed towards receiving, at an untrusted component, a query for a data store. The query includes a plurality of data operations. The data store is accessible by the untrusted component. A first proper subset of data operations is determined from t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Blanas, Spyridon, Arasu, Arvind, Kaushik, Shriraghav, Eguro, Kenneth H, Joglekar, Manas Rajendra, Kossmann, Donald, Ramamurthy, Ravishankar, Venkatesan, Ramarathnam, Upadhyaya, Prasang
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Blanas, Spyridon
Arasu, Arvind
Kaushik, Shriraghav
Eguro, Kenneth H
Joglekar, Manas Rajendra
Kossmann, Donald
Ramamurthy, Ravishankar
Venkatesan, Ramarathnam
Upadhyaya, Prasang
description Methods, systems, and computer-readable media are directed towards receiving, at an untrusted component, a query for a data store. The query includes a plurality of data operations. The data store is accessible by the untrusted component. A first proper subset of data operations is determined from the plurality of data operations that do not access sensitive data within the data store. A second proper subset of data operations is determined from the plurality of data operations that access sensitive data within the data store. The first proper subset of data operations is executed, at the untrusted component, to create first results. The second proper subset of data operations is sent to a trusted component for execution. Second results based on the sending the second proper subset of data operations are received from the trusted component. Results to the query are returned based on the first results and the second results.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US10671736B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US10671736B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US10671736B23</originalsourceid><addsrcrecordid>eNrjZLAPTk0uLUpVSEksSVQoKMpPTi0uzsxLV8jPUyhOzSvOLMksg0qWgsVLikqLS1JTFDISi1LKE4tSeRhY0xJzilN5oTQ3g6Kba4izh25qQX58anFBYnJqXmpJfGiwoYGZuaG5sZmTkTExagC0eDFm</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Secure data processing on sensitive data using trusted hardware</title><source>esp@cenet</source><creator>Blanas, Spyridon ; Arasu, Arvind ; Kaushik, Shriraghav ; Eguro, Kenneth H ; Joglekar, Manas Rajendra ; Kossmann, Donald ; Ramamurthy, Ravishankar ; Venkatesan, Ramarathnam ; Upadhyaya, Prasang</creator><creatorcontrib>Blanas, Spyridon ; Arasu, Arvind ; Kaushik, Shriraghav ; Eguro, Kenneth H ; Joglekar, Manas Rajendra ; Kossmann, Donald ; Ramamurthy, Ravishankar ; Venkatesan, Ramarathnam ; Upadhyaya, Prasang</creatorcontrib><description>Methods, systems, and computer-readable media are directed towards receiving, at an untrusted component, a query for a data store. The query includes a plurality of data operations. The data store is accessible by the untrusted component. A first proper subset of data operations is determined from the plurality of data operations that do not access sensitive data within the data store. A second proper subset of data operations is determined from the plurality of data operations that access sensitive data within the data store. The first proper subset of data operations is executed, at the untrusted component, to create first results. The second proper subset of data operations is sent to a trusted component for execution. Second results based on the sending the second proper subset of data operations are received from the trusted component. Results to the query are returned based on the first results and the second results.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2020</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20200602&amp;DB=EPODOC&amp;CC=US&amp;NR=10671736B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20200602&amp;DB=EPODOC&amp;CC=US&amp;NR=10671736B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Blanas, Spyridon</creatorcontrib><creatorcontrib>Arasu, Arvind</creatorcontrib><creatorcontrib>Kaushik, Shriraghav</creatorcontrib><creatorcontrib>Eguro, Kenneth H</creatorcontrib><creatorcontrib>Joglekar, Manas Rajendra</creatorcontrib><creatorcontrib>Kossmann, Donald</creatorcontrib><creatorcontrib>Ramamurthy, Ravishankar</creatorcontrib><creatorcontrib>Venkatesan, Ramarathnam</creatorcontrib><creatorcontrib>Upadhyaya, Prasang</creatorcontrib><title>Secure data processing on sensitive data using trusted hardware</title><description>Methods, systems, and computer-readable media are directed towards receiving, at an untrusted component, a query for a data store. The query includes a plurality of data operations. The data store is accessible by the untrusted component. A first proper subset of data operations is determined from the plurality of data operations that do not access sensitive data within the data store. A second proper subset of data operations is determined from the plurality of data operations that access sensitive data within the data store. The first proper subset of data operations is executed, at the untrusted component, to create first results. The second proper subset of data operations is sent to a trusted component for execution. Second results based on the sending the second proper subset of data operations are received from the trusted component. Results to the query are returned based on the first results and the second results.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2020</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZLAPTk0uLUpVSEksSVQoKMpPTi0uzsxLV8jPUyhOzSvOLMksg0qWgsVLikqLS1JTFDISi1LKE4tSeRhY0xJzilN5oTQ3g6Kba4izh25qQX58anFBYnJqXmpJfGiwoYGZuaG5sZmTkTExagC0eDFm</recordid><startdate>20200602</startdate><enddate>20200602</enddate><creator>Blanas, Spyridon</creator><creator>Arasu, Arvind</creator><creator>Kaushik, Shriraghav</creator><creator>Eguro, Kenneth H</creator><creator>Joglekar, Manas Rajendra</creator><creator>Kossmann, Donald</creator><creator>Ramamurthy, Ravishankar</creator><creator>Venkatesan, Ramarathnam</creator><creator>Upadhyaya, Prasang</creator><scope>EVB</scope></search><sort><creationdate>20200602</creationdate><title>Secure data processing on sensitive data using trusted hardware</title><author>Blanas, Spyridon ; Arasu, Arvind ; Kaushik, Shriraghav ; Eguro, Kenneth H ; Joglekar, Manas Rajendra ; Kossmann, Donald ; Ramamurthy, Ravishankar ; Venkatesan, Ramarathnam ; Upadhyaya, Prasang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US10671736B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2020</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Blanas, Spyridon</creatorcontrib><creatorcontrib>Arasu, Arvind</creatorcontrib><creatorcontrib>Kaushik, Shriraghav</creatorcontrib><creatorcontrib>Eguro, Kenneth H</creatorcontrib><creatorcontrib>Joglekar, Manas Rajendra</creatorcontrib><creatorcontrib>Kossmann, Donald</creatorcontrib><creatorcontrib>Ramamurthy, Ravishankar</creatorcontrib><creatorcontrib>Venkatesan, Ramarathnam</creatorcontrib><creatorcontrib>Upadhyaya, Prasang</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Blanas, Spyridon</au><au>Arasu, Arvind</au><au>Kaushik, Shriraghav</au><au>Eguro, Kenneth H</au><au>Joglekar, Manas Rajendra</au><au>Kossmann, Donald</au><au>Ramamurthy, Ravishankar</au><au>Venkatesan, Ramarathnam</au><au>Upadhyaya, Prasang</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Secure data processing on sensitive data using trusted hardware</title><date>2020-06-02</date><risdate>2020</risdate><abstract>Methods, systems, and computer-readable media are directed towards receiving, at an untrusted component, a query for a data store. The query includes a plurality of data operations. The data store is accessible by the untrusted component. A first proper subset of data operations is determined from the plurality of data operations that do not access sensitive data within the data store. A second proper subset of data operations is determined from the plurality of data operations that access sensitive data within the data store. The first proper subset of data operations is executed, at the untrusted component, to create first results. The second proper subset of data operations is sent to a trusted component for execution. Second results based on the sending the second proper subset of data operations are received from the trusted component. Results to the query are returned based on the first results and the second results.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US10671736B2
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Secure data processing on sensitive data using trusted hardware
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T12%3A19%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Blanas,%20Spyridon&rft.date=2020-06-02&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS10671736B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true