{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:03:07Z","timestamp":1765544587483},"reference-count":10,"publisher":"Association for Computing Machinery (ACM)","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2015,8]]},"abstract":"<jats:p>We address security issues in a cloud database system which employs the DBaaS model --- a data owner (DO) exports data to a cloud database service provider (SP). To provide data security, sensitive data is encrypted by the DO before it is uploaded to the SP. Compared to existing secure query processing systems like CryptDB [7] and MONOMI [8], in which data operations (e.g., comparison or addition) are supported by specialized encryption schemes, our demo system, SDB, is implemented based on a set of data-interoperable secure operators, i.e., the output of an operator can be used as input of another operator. As a result, SDB can support a wide range of complex queries (e.g., all TPC-H queries) efficiently. In this demonstration, we show how our SDB prototype supports secure query processing on complex workload like TPC-H. We also demonstrate how our system protects sensitive information from malicious attackers.<\/jats:p>","DOI":"10.14778\/2824032.2824090","type":"journal-article","created":{"date-parts":[[2015,9,16]],"date-time":"2015-09-16T12:18:17Z","timestamp":1442405897000},"page":"1876-1879","source":"Crossref","is-referenced-by-count":16,"title":["SDB"],"prefix":"10.14778","volume":"8","author":[{"given":"Zhian","family":"He","sequence":"first","affiliation":[{"name":"The Hong Kong Polytechnic University"}]},{"given":"Wai Kit","family":"Wong","sequence":"additional","affiliation":[{"name":"Hang Seng Management College"}]},{"given":"Ben","family":"Kao","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"David Wai Lok","family":"Cheung","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"Rongbin","family":"Li","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"Siu Ming","family":"Yiu","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"Eric","family":"Lo","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University"}]}],"member":"320","published-online":{"date-parts":[[2015,8]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Spark SQL https:\/\/spark.apache.org\/sql\/.  Spark SQL https:\/\/spark.apache.org\/sql\/."},{"key":"e_1_2_1_2_1","volume-title":"SIGMOD","author":"Arasu A.","year":"2013","unstructured":"A. Arasu , S. Blanas , K. Eguro , M. Joglekar , R. Kaushik , D. Kossmann , R. Ramamurthy , P. Upadhyaya , and R. Venkatesan . Secure database-as-a-service with cipherbase . In SIGMOD , 2013 . 10.1145\/2463676.2467797 A. Arasu, S. Blanas, K. Eguro, M. Joglekar, R. Kaushik, D. Kossmann, R. Ramamurthy, P. Upadhyaya, and R. Venkatesan. Secure database-as-a-service with cipherbase. In SIGMOD, 2013. 10.1145\/2463676.2467797"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989346"},{"key":"e_1_2_1_4_1","volume-title":"CRYPTO","author":"Boldyreva A.","year":"2011","unstructured":"A. Boldyreva , N. Chenette , and A. O'Neill . Order-preserving encryption revisited: Improved security analysis and alternative solutions . In CRYPTO , 2011 . A. Boldyreva, N. Chenette, and A. O'Neill. Order-preserving encryption revisited: Improved security analysis and alternative solutions. In CRYPTO, 2011."},{"key":"e_1_2_1_5_1","volume-title":"Gawker","author":"Chen A.","year":"2010","unstructured":"A. Chen . GCreep : Google engineer stalked teens, spied on chats . Gawker , September 2010 http:\/\/gawker.com\/5637234\/. A. Chen. GCreep: Google engineer stalked teens, spied on chats. Gawker, September 2010 http:\/\/gawker.com\/5637234\/."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767886"},{"key":"e_1_2_1_7_1","volume-title":"CACM","author":"Popa R. A.","year":"2012","unstructured":"R. A. Popa , C. M. S. Redfield , N. Zeldovich , and H. Balakrishnan . Cryptdb: processing queries on an encrypted database . CACM , 2012 . 10.1145\/2330667.2330691 R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan. Cryptdb: processing queries on an encrypted database. CACM, 2012. 10.1145\/2330667.2330691"},{"key":"e_1_2_1_8_1","volume-title":"PVLDB","author":"Tu S.","year":"2013","unstructured":"S. Tu , M. F. Kaashoek , S. Madden , and N. Zeldovich . Processing analytical queries over encrypted data . In PVLDB , 2013 . 10.14778\/2535573.2488336 S. Tu, M. F. Kaashoek, S. Madden, and N. Zeldovich. Processing analytical queries over encrypted data. In PVLDB, 2013. 10.14778\/2535573.2488336"},{"key":"e_1_2_1_9_1","volume-title":"SIGMOD","author":"Wong W. K.","year":"2014","unstructured":"W. K. Wong , B. Kao , D. W. L. Cheung , R. Li , and S. M. Yiu . Secure query processing with data interoperability in a cloud database environment . In SIGMOD , 2014 . 10.1145\/2588555.2588572 W. K. Wong, B. Kao, D. W. L. Cheung, R. Li, and S. M. Yiu. Secure query processing with data interoperability in a cloud database environment. In SIGMOD, 2014. 10.1145\/2588555.2588572"},{"key":"e_1_2_1_11_1","volume-title":"FOCS, 1982","author":"Yao A. C.","year":"1982","unstructured":"A. C. Yao . Protocols for secure computations (extended abstract) . In FOCS, 1982 . 10.1109\/SFCS. 1982 .88 A. C. Yao. Protocols for secure computations (extended abstract). In FOCS, 1982. 10.1109\/SFCS.1982.88"}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/2824032.2824090","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T10:03:02Z","timestamp":1672221782000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/2824032.2824090"}},"subtitle":["a secure query processing system with data interoperability"],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":10,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2015,8]]}},"alternative-id":["10.14778\/2824032.2824090"],"URL":"https:\/\/doi.org\/10.14778\/2824032.2824090","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2015,8]]}}}