Sovereign information sharing service
First Claim
1. A method for secure distributed query processing, comprising:
- storing data tables from at least one data provider in at least one first computer comprising a sovereign server;
performing encrypted input and output of said data tables between said server and a second computer;
computing join operations, comprising determining whether arbitrary join predicates yield matches within said data tables;
outputting encrypted results of said join operations; and
minimizing possible information leakage from interaction between said server and said second computer by making observations and inferences from patterns of said outputting of said encrypted results.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments herein provide a method, system, etc. for a sovereign information sharing service. More specifically, a method for secure distributed query processing comprises storing data tables from at least one data provider in at least one first computer comprising a sovereign server. Next, encrypted input and output of the data tables is performed between the server and a second computer. Following this, join operations are computed, comprising determining whether arbitrary join predicates yield matches within the data tables; and encrypted results of the join operations are output. The method minimizes possible information leakage from interaction between the server and the second computer by making observations and inferences from patterns of the outputting of the encrypted results.
60 Citations
20 Claims
-
1. A method for secure distributed query processing, comprising:
-
storing data tables from at least one data provider in at least one first computer comprising a sovereign server;
performing encrypted input and output of said data tables between said server and a second computer;
computing join operations, comprising determining whether arbitrary join predicates yield matches within said data tables;
outputting encrypted results of said join operations; and
minimizing possible information leakage from interaction between said server and said second computer by making observations and inferences from patterns of said outputting of said encrypted results. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for secure distributed query processing, comprising:
-
performing encrypted input and output of data tables between a server and a secure computer;
performing queries of said data tables to produce results;
modifying said results by at least one of increasing a size of said results, increasing a processing time of said results, and encrypting said results to produce modified results; and
outputting said modified results. - View Dependent Claims (7, 8, 9)
-
-
10. A system for secure distributed query processing, comprising:
-
at least one first computer comprising a sovereign server adapted to store data tables from at least one data provider; and
a second computer operatively connected to said first computer, wherein said second computer is adapted to perform encrypted input and output of said data tables with said first computer, compute join operations to determine whether arbitrary join predicates yield matches within said data tables, and output encrypted results of said join operations, and wherein said second computer is adapted to output a fixed size of said encrypted results during a fixed processing time. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A system for secure distributed query processing, comprising:
-
a secure computer adapted to perform encrypted input and output of data tables with a server, perform queries of said data tables to produce results, modify said results to produce modified results, and output said modified results, wherein said modified results comprise at least one of a fixed size and a fixed processing time. - View Dependent Claims (18, 19, 20)
-
Specification