Tagged with: Security and Privacy


PROPOSAL

(This topic is going to be co-supervised by Bernardo Machado David [http://www.bmdavid.com/]) Database systems managing private data may leak sensitive information when queries are done in the clear, even if the data itself is encrypted. A recent line of research has looked into combining database engines supporting standard SQL queries with techniques for secure Multiparty Computation (MPC), …
Supervisors: Zsolt István
Semester: Spring 2021
Tags: Theoretical Computer Science, Data Management, Security and Privacy

PROPOSAL

Given a private database that I can access only through specific queries, there is still a lot I can learn on its entries [1]. Differential Privacy (DP) tackles this: letting me learn the (approximate) result of complex queries on a database, but preventing me from learning much about its specific entries. The basic approach of DP often boils down to: “apply a privacy-preserving transformation T …
Supervisors: Zsolt István
Semester: Spring 2021
Tags: Theoretical Computer Science, Data Management, Security and Privacy

PROPOSAL

Modern data analytics systems are composed of two types of nodes: compute and storage (e.g., Amazon S3, Redis, MongoDB, etc.). The storage nodes typically offer a key-value interface and are often used to store data encoded in a columnar format (e.g., Parquet files). Due to growing data sizes in datacenters, there is an increasing interest in using specialized hardware devices, namely Field …
Supervisors: Zsolt István
Semester: Spring 2021
Tags: FPGA, Hardware-software Co-design, Security and Privacy