dc.contributor.author | Tu, Stephen Lyle | |
dc.contributor.author | Kaashoek, M. Frans | |
dc.contributor.author | Madden, Samuel R. | |
dc.contributor.author | Zeldovich, Nickolai | |
dc.date.accessioned | 2014-05-16T14:19:04Z | |
dc.date.available | 2014-05-16T14:19:04Z | |
dc.date.issued | 2013-08 | |
dc.identifier.issn | 2150-8097 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/87023 | |
dc.description.abstract | MONOMI is a system for securely executing analytical workloads over sensitive data on an untrusted database server. MONOMI works by encrypting the entire database and running queries over the encrypted data. MONOMI introduces split client/server query execution, which can execute arbitrarily complex queries over encrypted data, as well as several techniques that improve performance for such workloads, including per-row precomputation, space-efficient encryption, grouped homomorphic addition, and pre-filtering. Since these optimizations are good for some queries but not others, MONOMI introduces a designer for choosing an efficient physical design at the server for a given workload, and a planner to choose an efficient execution plan for a given query at runtime. A prototype of MONOMI running on top of Postgres can execute most of the queries from the TPC-H benchmark with a median overhead of only 1.24× (ranging from 1.03×to 2.33×) compared to an un-encrypted Postgres database where a compromised server would reveal all data. | en_US |
dc.description.sponsorship | National Science Foundation (U.S.) (Award IIS-1065219) | en_US |
dc.description.sponsorship | Google (Firm) | en_US |
dc.language.iso | en_US | |
dc.publisher | Association for Computing Machinery (ACM) | en_US |
dc.relation.isversionof | http://dl.acm.org/citation.cfm?id=2535573.2488336&coll=DL&dl=ACM&CFID=334604825&CFTOKEN=24405009 | en_US |
dc.rights | Creative Commons Attribution-Noncommercial-Share Alike | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/4.0/ | en_US |
dc.source | MIT web domain | en_US |
dc.title | Processing Analytical Queries over Encrypted Data | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Stephen Tu, M. Frans Kaashoek, Samuel Madden, and Nickolai Zeldovich. 2013. Processing analytical queries over encrypted data. In Proceedings of the 39th international conference on Very Large Data Bases (PVLDB'13), Michael Böhlen and Christoph Koch (Eds.). VLDB Endowment 289-300. | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
dc.contributor.mitauthor | Tu, Stephen Lyle | en_US |
dc.contributor.mitauthor | Kaashoek, M. Frans | en_US |
dc.contributor.mitauthor | Madden, Samuel R. | en_US |
dc.contributor.mitauthor | Zeldovich, Nickolai | en_US |
dc.relation.journal | Proceedings of the 39th international conference on Very Large Data Bases (PVLDB '13) | en_US |
dc.eprint.version | Author's final manuscript | en_US |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
eprint.status | http://purl.org/eprint/status/NonPeerReviewed | en_US |
dspace.orderedauthors | Tu, Stephen Lyle; Kaashoek, M. Frans; Madden, Samuel R.; Zeldovich, Nickolai | en_US |
dc.identifier.orcid | https://orcid.org/0000-0002-7470-3265 | |
dc.identifier.orcid | https://orcid.org/0000-0003-0238-2703 | |
dc.identifier.orcid | https://orcid.org/0000-0001-7098-586X | |
mit.license | OPEN_ACCESS_POLICY | en_US |
mit.metadata.status | Complete | |