Secure data processing on sensitive data using trusted hardware
Methods, systems, and computer-readable media are directed towards receiving, at an untrusted component, a query for a data store. The query includes a plurality of data operations. The data store is accessible by the untrusted component. A first proper subset of data operations is determined from t...
Gespeichert in:
Hauptverfasser: | , , , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Blanas, Spyridon Arasu, Arvind Kaushik, Shriraghav Eguro, Kenneth H Joglekar, Manas Rajendra Kossmann, Donald Ramamurthy, Ravishankar Venkatesan, Ramarathnam Upadhyaya, Prasang |
description | Methods, systems, and computer-readable media are directed towards receiving, at an untrusted component, a query for a data store. The query includes a plurality of data operations. The data store is accessible by the untrusted component. A first proper subset of data operations is determined from the plurality of data operations that do not access sensitive data within the data store. A second proper subset of data operations is determined from the plurality of data operations that access sensitive data within the data store. The first proper subset of data operations is executed, at the untrusted component, to create first results. The second proper subset of data operations is sent to a trusted component for execution. Second results based on the sending the second proper subset of data operations are received from the trusted component. Results to the query are returned based on the first results and the second results. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US10671736B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US10671736B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US10671736B23</originalsourceid><addsrcrecordid>eNrjZLAPTk0uLUpVSEksSVQoKMpPTi0uzsxLV8jPUyhOzSvOLMksg0qWgsVLikqLS1JTFDISi1LKE4tSeRhY0xJzilN5oTQ3g6Kba4izh25qQX58anFBYnJqXmpJfGiwoYGZuaG5sZmTkTExagC0eDFm</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Secure data processing on sensitive data using trusted hardware</title><source>esp@cenet</source><creator>Blanas, Spyridon ; Arasu, Arvind ; Kaushik, Shriraghav ; Eguro, Kenneth H ; Joglekar, Manas Rajendra ; Kossmann, Donald ; Ramamurthy, Ravishankar ; Venkatesan, Ramarathnam ; Upadhyaya, Prasang</creator><creatorcontrib>Blanas, Spyridon ; Arasu, Arvind ; Kaushik, Shriraghav ; Eguro, Kenneth H ; Joglekar, Manas Rajendra ; Kossmann, Donald ; Ramamurthy, Ravishankar ; Venkatesan, Ramarathnam ; Upadhyaya, Prasang</creatorcontrib><description>Methods, systems, and computer-readable media are directed towards receiving, at an untrusted component, a query for a data store. The query includes a plurality of data operations. The data store is accessible by the untrusted component. A first proper subset of data operations is determined from the plurality of data operations that do not access sensitive data within the data store. A second proper subset of data operations is determined from the plurality of data operations that access sensitive data within the data store. The first proper subset of data operations is executed, at the untrusted component, to create first results. The second proper subset of data operations is sent to a trusted component for execution. Second results based on the sending the second proper subset of data operations are received from the trusted component. Results to the query are returned based on the first results and the second results.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2020</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20200602&DB=EPODOC&CC=US&NR=10671736B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20200602&DB=EPODOC&CC=US&NR=10671736B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Blanas, Spyridon</creatorcontrib><creatorcontrib>Arasu, Arvind</creatorcontrib><creatorcontrib>Kaushik, Shriraghav</creatorcontrib><creatorcontrib>Eguro, Kenneth H</creatorcontrib><creatorcontrib>Joglekar, Manas Rajendra</creatorcontrib><creatorcontrib>Kossmann, Donald</creatorcontrib><creatorcontrib>Ramamurthy, Ravishankar</creatorcontrib><creatorcontrib>Venkatesan, Ramarathnam</creatorcontrib><creatorcontrib>Upadhyaya, Prasang</creatorcontrib><title>Secure data processing on sensitive data using trusted hardware</title><description>Methods, systems, and computer-readable media are directed towards receiving, at an untrusted component, a query for a data store. The query includes a plurality of data operations. The data store is accessible by the untrusted component. A first proper subset of data operations is determined from the plurality of data operations that do not access sensitive data within the data store. A second proper subset of data operations is determined from the plurality of data operations that access sensitive data within the data store. The first proper subset of data operations is executed, at the untrusted component, to create first results. The second proper subset of data operations is sent to a trusted component for execution. Second results based on the sending the second proper subset of data operations are received from the trusted component. Results to the query are returned based on the first results and the second results.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2020</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZLAPTk0uLUpVSEksSVQoKMpPTi0uzsxLV8jPUyhOzSvOLMksg0qWgsVLikqLS1JTFDISi1LKE4tSeRhY0xJzilN5oTQ3g6Kba4izh25qQX58anFBYnJqXmpJfGiwoYGZuaG5sZmTkTExagC0eDFm</recordid><startdate>20200602</startdate><enddate>20200602</enddate><creator>Blanas, Spyridon</creator><creator>Arasu, Arvind</creator><creator>Kaushik, Shriraghav</creator><creator>Eguro, Kenneth H</creator><creator>Joglekar, Manas Rajendra</creator><creator>Kossmann, Donald</creator><creator>Ramamurthy, Ravishankar</creator><creator>Venkatesan, Ramarathnam</creator><creator>Upadhyaya, Prasang</creator><scope>EVB</scope></search><sort><creationdate>20200602</creationdate><title>Secure data processing on sensitive data using trusted hardware</title><author>Blanas, Spyridon ; Arasu, Arvind ; Kaushik, Shriraghav ; Eguro, Kenneth H ; Joglekar, Manas Rajendra ; Kossmann, Donald ; Ramamurthy, Ravishankar ; Venkatesan, Ramarathnam ; Upadhyaya, Prasang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US10671736B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2020</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Blanas, Spyridon</creatorcontrib><creatorcontrib>Arasu, Arvind</creatorcontrib><creatorcontrib>Kaushik, Shriraghav</creatorcontrib><creatorcontrib>Eguro, Kenneth H</creatorcontrib><creatorcontrib>Joglekar, Manas Rajendra</creatorcontrib><creatorcontrib>Kossmann, Donald</creatorcontrib><creatorcontrib>Ramamurthy, Ravishankar</creatorcontrib><creatorcontrib>Venkatesan, Ramarathnam</creatorcontrib><creatorcontrib>Upadhyaya, Prasang</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Blanas, Spyridon</au><au>Arasu, Arvind</au><au>Kaushik, Shriraghav</au><au>Eguro, Kenneth H</au><au>Joglekar, Manas Rajendra</au><au>Kossmann, Donald</au><au>Ramamurthy, Ravishankar</au><au>Venkatesan, Ramarathnam</au><au>Upadhyaya, Prasang</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Secure data processing on sensitive data using trusted hardware</title><date>2020-06-02</date><risdate>2020</risdate><abstract>Methods, systems, and computer-readable media are directed towards receiving, at an untrusted component, a query for a data store. The query includes a plurality of data operations. The data store is accessible by the untrusted component. A first proper subset of data operations is determined from the plurality of data operations that do not access sensitive data within the data store. A second proper subset of data operations is determined from the plurality of data operations that access sensitive data within the data store. The first proper subset of data operations is executed, at the untrusted component, to create first results. The second proper subset of data operations is sent to a trusted component for execution. Second results based on the sending the second proper subset of data operations are received from the trusted component. Results to the query are returned based on the first results and the second results.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US10671736B2 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Secure data processing on sensitive data using trusted hardware |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T12%3A19%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Blanas,%20Spyridon&rft.date=2020-06-02&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS10671736B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |