SlideShare a Scribd company logo
TrustedDB: A Trusted Hardware based Database with 
Privacy and Data Confidentiality 
ABSTRACT: 
Traditionally, as soon as confidentiality becomes a concern, data is encrypted 
before outsourcing to a service provider. Any software-based cryptographic 
constructs then deployed, for server-side query processing on the encrypted data, 
inherently limit query expressiveness. Here, we introduce TrustedDB, an 
outsourced database prototype that allows clients to execute SQL queries with 
privacy and under regulatory compliance constraints by leveraging server-hosted, 
tamper-proof trusted hardware in critical query processing stages, thereby 
removing any limitations on the type of supported queries. Despite the cost 
overhead and performance limitations of trusted hardware, we show that the costs 
per query are orders of magnitude lower than any (existing or) potential future 
software-only mechanisms. TrustedDB is built and runs on actual hardware and its 
performance and costs are evaluated here. 
EXISTING SYSTEM: 
Existing research addresses several such security aspects, including access privacy 
and searches on encrypted data. In most of these efforts data is encrypted before
outsourcing. Once encrypted however, inherent limitations in the types of primitive 
operations that can be performed on encrypted data lead to fundamental 
expressiveness and practicality constraints. Recent theoretical cryptography results 
provide hope by proving the existence of universal homeomorphisms, i.e., 
encryption mechanisms that allow computation of arbitrary functions without 
decrypting the inputs. Unfortunately actual instances of such mechanisms seem to 
be decades away from being practical 
DISADVANTAGES OF EXISTING SYSTEM: 
Trusted hardware is generally impractical due to its performance limitations and 
higher acquisition costs. As a result, with very few exceptions, these efforts have 
stopped short of proposing or building full - fledged database processing engines. 
Computation inside secure processors is orders of magnitude cheaper than any 
equivalent cryptographic operation performed on the provider’s unsecured server 
hardware, despite the overall greater acquisition cost of secure hardware. 
PROPOSED SYSTEM: 
we posit that a full-fledged, privacy enabling secure database leveraging server-side 
trusted hardware can be built and run at a fraction of the cost of any (existing 
or future) cryptography-enabled private data processing on common server 
hardware. We validate this by designing and building TrustedDB, a SQL database
processing engine that makes use of tamperproof cryptographic coprocessors such 
as the IBM 4764 in close proximity to the outsourced data. Tamper resistant 
designs however are significantly constrained in both computational ability and 
memory capacity which makes implementing fully featured database solutions 
using secure coprocessors (SCPUs) very challenging. TrustedDB achieves this by 
utilizing common unsecured server resources to the maximum extent possible. 
E.g., TrustedDB enables the SCPU to transparently access external storage while 
preserving data confidentiality with on-the-fly encryption. This eliminates the 
limitations on the size of databases that can be supported. Moreover, client queries 
are pre-processed to identify sensitive components to be run inside the SCPU. 
Non-sensitive operations are off-loaded to the untrusted host server. This greatly 
improves performance and reduces the cost of transactions. 
ADVANTAGES OF PROPOSED SYSTEM: 
(i) The introduction of new cost models and insights that explain and 
quantify the advantages of deploying trusted hardware for data 
processing, 
(ii) the design, development, and evaluation of TrustedDB, a trusted 
hardware based relational database with full data confidentiality, and 
(iii) Detailed query optimization techniques in a trusted hardware-based query 
execution model.
SYSTEM ARCHITECTURE: 
MODULES: 
1. Query Parsing and Execution 
2. Query optimization process 
3. System Catalog 
4. Analysis of Basic Query Operations
MODULES DESCRIPTION: 
Query Parsing and Execution 
In the first stage a client defines a database schema and partially populates it. 
Sensitive attributes are marked using the SENSITIVE keyword which the client 
layer transparently processes by encrypting the corresponding attributes: 
CREATE TABLE customer (ID integer primary key, Name char (72) 
SENSITIVE, Address char (120) SENSITIVE); 
(1) Later, a client sends a query request to the host server through a standard SQL 
interface. The query is transparently encrypted at the client site using the public 
key of the SCPU. The host server thus cannot decrypt the query. (2) The host 
server forwards the encrypted query to the Request Handler inside the SCPU. (3) 
The Request Handler decrypts the query and forwards it to the Query Parser. The 
query is parsed generating a set of plans. Each plan is constructed by rewriting the 
original client query into a set of sub-queries, and, according to their target data set 
classification, each sub-query in the plan is identified as being either public or 
private. (4)The Query Optimizer then estimates the execution costs of each of the 
plans and selects the best plan (one with least cost) for execution forwarding it to 
the dispatcher.(5) The Query Dispatcher forwards the public queries to the host 
server and the private queries to the SCPU database engine while handling
dependencies. The net result is that the maximum possible work is run on the host 
server’s cheap cycles. (6) The final query result is assembled, encrypted, digitally 
signed by the SCPU Query Dispatcher, and sent to the client. 
Query optimization process: 
At a high level query optimization in a database system works as follows. 
(i) The Query Plan Generator constructs possibly multiple plans for the client 
query. 
(ii) For each constructed plan the Query Cost Estimator computes an estimate of 
the execution cost of that plan. 
(iii) The best plan i.e., one with the least cost, is then selected and passed on to the 
Query Plan Interpretor for execution. 
The query optimization process in TrustedDB works similarly with key differences 
in the Query Cost Estimator due to the logical partitioning of data mentioned 
above. 
System Catalog: 
Any query plan is composed of multiple individual execution steps. To estimate 
the cost of the entire plan it is essential to estimate the cost of individual steps and 
aggregate them. In order to estimate these costs the Query Cost Estimator needs
access to some key information. E.g., the availability of an index or the knowledge 
of possible distinct values of an attribute. These sets of information are collected 
and stored in the System Catalog. Most available DBMS today have some form of 
periodically updated System Catalog. 
Analysis of Basic Query Operations: 
The cost of a plan is the aggregate of the cost of the steps that comprise it. In this 
section we present how execution times for a certain set of basic query plan steps 
are estimated. 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Monitor : 15 inch VGA Colour. 
 Mouse : Logitech Mouse. 
 Ram : 512 MB 
 Keyboard : Standard Keyboard
SOFTWARE REQUIREMENTS: 
 Operating System : Windows XP. 
 Coding Language : ASP.NET, C#.Net. 
 Database : SQL Server 2005 
REFERENCE: 
Sumeet Bajaj, Radu Sion “TrustedDB: A Trusted Hardware based Database with 
Privacy and Data Confidentiality” - IEEE TRANSACTIONS ON 
KNOWLEDGE AND DATA ENGINEERING, VOL. 26, NO. 3, MARCH 
2014

More Related Content

PPTX
Trusted DB a trusted hardware based database with privacy and data confidenti...
PPTX
Trusted db a trusted hardware based database with privacy and data confidenti...
DOCX
TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidenti...
DOCX
Trusted db a trusted hardware based database with privacy and data confidenti...
PDF
Keeping your Enterprise’s Big Data Secure by Owen O’Malley at Big Data Spain ...
PPTX
SQL Server 2016 New Security Features
PPTX
Managing Multi-Tenant SaaS Applications at Scale
PPTX
Solving Complex Scaling Problems by Prashant Kumar and Abhishek Jain of Myntr...
Trusted DB a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...
TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...
Keeping your Enterprise’s Big Data Secure by Owen O’Malley at Big Data Spain ...
SQL Server 2016 New Security Features
Managing Multi-Tenant SaaS Applications at Scale
Solving Complex Scaling Problems by Prashant Kumar and Abhishek Jain of Myntr...

What's hot (20)

PDF
Cloud-Scale BGP and NetFlow Analysis
PPTX
Paul Dix [InfluxData] | InfluxDays Opening Keynote | InfluxDays Virtual Exper...
PDF
Big Data security: Facing the challenge by Carlos Gómez at Big Data Spain 2017
PDF
Next-Gen DDoS Detection
PDF
Walk Through a Software Defined Everything PoC
PPTX
Redis presentation
PPTX
RedisConf18 - Techniques for Synchronizing In-Memory Caches with Redis
PDF
The future of Hadoop security and its evolution by Alejandro González at Big ...
PPTX
Data protection for hadoop environments
PPTX
Azure SQL DB V12 at your service by Pieter Vanhove
PPTX
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
PDF
Kentik Detect Engine - Network Field Day 2017
PDF
Kentik Network@Scale (Dan Ellis)
PPTX
Cloud Design Patterns
PDF
Caching for Microservices Architectures: Session I
PPTX
2021 March Pravega Community Meeting
PPTX
RedisConf18 - The Intelligent Database Proxy
ODP
Everything you always wanted to know about Distributed databases, at devoxx l...
PPTX
BigDataTech 2016 How to manage authorization rules on Hadoop cluster with Apa...
PDF
DATA LAKE AND THE RISE OF THE MICROSERVICES - ALEX BORDEI
Cloud-Scale BGP and NetFlow Analysis
Paul Dix [InfluxData] | InfluxDays Opening Keynote | InfluxDays Virtual Exper...
Big Data security: Facing the challenge by Carlos Gómez at Big Data Spain 2017
Next-Gen DDoS Detection
Walk Through a Software Defined Everything PoC
Redis presentation
RedisConf18 - Techniques for Synchronizing In-Memory Caches with Redis
The future of Hadoop security and its evolution by Alejandro González at Big ...
Data protection for hadoop environments
Azure SQL DB V12 at your service by Pieter Vanhove
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Kentik Detect Engine - Network Field Day 2017
Kentik Network@Scale (Dan Ellis)
Cloud Design Patterns
Caching for Microservices Architectures: Session I
2021 March Pravega Community Meeting
RedisConf18 - The Intelligent Database Proxy
Everything you always wanted to know about Distributed databases, at devoxx l...
BigDataTech 2016 How to manage authorization rules on Hadoop cluster with Apa...
DATA LAKE AND THE RISE OF THE MICROSERVICES - ALEX BORDEI
Ad

Similar to JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality (20)

DOCX
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
DOCX
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...
DOCX
trusted db a trusted hardware-based database with privacy and data confidenti...
PDF
Trusted Hardware Database With Privacy And Data Confidentiality
PDF
Protecting Global Records Sharing with Identity Based Access Control List
PDF
Protecting Global Records Sharing with Identity Based Access Control List
DOCX
Farheen
PDF
Sensitive Data Protection in DBaaS
PDF
Opaque: A Data Analytics Platform with Strong Security: Spark Summit East tal...
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
PDF
Optimized search and-compute circuits and their application to query evaluati...
PPT
Using In-Memory Encrypted Databases on the Cloud
PPT
Presentazione pagano1
PDF
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
DOCX
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Distributed -concurrent--and-indepen...
PPTX
Next basepresentation
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
PDF
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...
trusted db a trusted hardware-based database with privacy and data confidenti...
Trusted Hardware Database With Privacy And Data Confidentiality
Protecting Global Records Sharing with Identity Based Access Control List
Protecting Global Records Sharing with Identity Based Access Control List
Farheen
Sensitive Data Protection in DBaaS
Opaque: A Data Analytics Platform with Strong Security: Spark Summit East tal...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
Optimized search and-compute circuits and their application to query evaluati...
Using In-Memory Encrypted Databases on the Cloud
Presentazione pagano1
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Distributed -concurrent--and-indepen...
Next basepresentation
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...
Ad

More from chennaijp (20)

DOCX
JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
DOCX
JPN1423 Stars a Statistical Traffic Pattern
DOCX
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
DOCX
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
DOCX
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
DOCX
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
DOCX
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
DOCX
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
DOCX
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
DOCX
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
DOCX
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
DOCX
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
DOCX
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
DOCX
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
DOCX
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
DOCX
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
DOCX
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
DOCX
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
DOCX
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
DOCX
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
JPN1423 Stars a Statistical Traffic Pattern
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification

Recently uploaded (20)

PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPT
Project quality management in manufacturing
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
web development for engineering and engineering
PPTX
additive manufacturing of ss316l using mig welding
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
CH1 Production IntroductoryConcepts.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Internet of Things (IOT) - A guide to understanding
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Project quality management in manufacturing
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
web development for engineering and engineering
additive manufacturing of ss316l using mig welding
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
CH1 Production IntroductoryConcepts.pptx

JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality

  • 1. TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality ABSTRACT: Traditionally, as soon as confidentiality becomes a concern, data is encrypted before outsourcing to a service provider. Any software-based cryptographic constructs then deployed, for server-side query processing on the encrypted data, inherently limit query expressiveness. Here, we introduce TrustedDB, an outsourced database prototype that allows clients to execute SQL queries with privacy and under regulatory compliance constraints by leveraging server-hosted, tamper-proof trusted hardware in critical query processing stages, thereby removing any limitations on the type of supported queries. Despite the cost overhead and performance limitations of trusted hardware, we show that the costs per query are orders of magnitude lower than any (existing or) potential future software-only mechanisms. TrustedDB is built and runs on actual hardware and its performance and costs are evaluated here. EXISTING SYSTEM: Existing research addresses several such security aspects, including access privacy and searches on encrypted data. In most of these efforts data is encrypted before
  • 2. outsourcing. Once encrypted however, inherent limitations in the types of primitive operations that can be performed on encrypted data lead to fundamental expressiveness and practicality constraints. Recent theoretical cryptography results provide hope by proving the existence of universal homeomorphisms, i.e., encryption mechanisms that allow computation of arbitrary functions without decrypting the inputs. Unfortunately actual instances of such mechanisms seem to be decades away from being practical DISADVANTAGES OF EXISTING SYSTEM: Trusted hardware is generally impractical due to its performance limitations and higher acquisition costs. As a result, with very few exceptions, these efforts have stopped short of proposing or building full - fledged database processing engines. Computation inside secure processors is orders of magnitude cheaper than any equivalent cryptographic operation performed on the provider’s unsecured server hardware, despite the overall greater acquisition cost of secure hardware. PROPOSED SYSTEM: we posit that a full-fledged, privacy enabling secure database leveraging server-side trusted hardware can be built and run at a fraction of the cost of any (existing or future) cryptography-enabled private data processing on common server hardware. We validate this by designing and building TrustedDB, a SQL database
  • 3. processing engine that makes use of tamperproof cryptographic coprocessors such as the IBM 4764 in close proximity to the outsourced data. Tamper resistant designs however are significantly constrained in both computational ability and memory capacity which makes implementing fully featured database solutions using secure coprocessors (SCPUs) very challenging. TrustedDB achieves this by utilizing common unsecured server resources to the maximum extent possible. E.g., TrustedDB enables the SCPU to transparently access external storage while preserving data confidentiality with on-the-fly encryption. This eliminates the limitations on the size of databases that can be supported. Moreover, client queries are pre-processed to identify sensitive components to be run inside the SCPU. Non-sensitive operations are off-loaded to the untrusted host server. This greatly improves performance and reduces the cost of transactions. ADVANTAGES OF PROPOSED SYSTEM: (i) The introduction of new cost models and insights that explain and quantify the advantages of deploying trusted hardware for data processing, (ii) the design, development, and evaluation of TrustedDB, a trusted hardware based relational database with full data confidentiality, and (iii) Detailed query optimization techniques in a trusted hardware-based query execution model.
  • 4. SYSTEM ARCHITECTURE: MODULES: 1. Query Parsing and Execution 2. Query optimization process 3. System Catalog 4. Analysis of Basic Query Operations
  • 5. MODULES DESCRIPTION: Query Parsing and Execution In the first stage a client defines a database schema and partially populates it. Sensitive attributes are marked using the SENSITIVE keyword which the client layer transparently processes by encrypting the corresponding attributes: CREATE TABLE customer (ID integer primary key, Name char (72) SENSITIVE, Address char (120) SENSITIVE); (1) Later, a client sends a query request to the host server through a standard SQL interface. The query is transparently encrypted at the client site using the public key of the SCPU. The host server thus cannot decrypt the query. (2) The host server forwards the encrypted query to the Request Handler inside the SCPU. (3) The Request Handler decrypts the query and forwards it to the Query Parser. The query is parsed generating a set of plans. Each plan is constructed by rewriting the original client query into a set of sub-queries, and, according to their target data set classification, each sub-query in the plan is identified as being either public or private. (4)The Query Optimizer then estimates the execution costs of each of the plans and selects the best plan (one with least cost) for execution forwarding it to the dispatcher.(5) The Query Dispatcher forwards the public queries to the host server and the private queries to the SCPU database engine while handling
  • 6. dependencies. The net result is that the maximum possible work is run on the host server’s cheap cycles. (6) The final query result is assembled, encrypted, digitally signed by the SCPU Query Dispatcher, and sent to the client. Query optimization process: At a high level query optimization in a database system works as follows. (i) The Query Plan Generator constructs possibly multiple plans for the client query. (ii) For each constructed plan the Query Cost Estimator computes an estimate of the execution cost of that plan. (iii) The best plan i.e., one with the least cost, is then selected and passed on to the Query Plan Interpretor for execution. The query optimization process in TrustedDB works similarly with key differences in the Query Cost Estimator due to the logical partitioning of data mentioned above. System Catalog: Any query plan is composed of multiple individual execution steps. To estimate the cost of the entire plan it is essential to estimate the cost of individual steps and aggregate them. In order to estimate these costs the Query Cost Estimator needs
  • 7. access to some key information. E.g., the availability of an index or the knowledge of possible distinct values of an attribute. These sets of information are collected and stored in the System Catalog. Most available DBMS today have some form of periodically updated System Catalog. Analysis of Basic Query Operations: The cost of a plan is the aggregate of the cost of the steps that comprise it. In this section we present how execution times for a certain set of basic query plan steps are estimated. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Monitor : 15 inch VGA Colour.  Mouse : Logitech Mouse.  Ram : 512 MB  Keyboard : Standard Keyboard
  • 8. SOFTWARE REQUIREMENTS:  Operating System : Windows XP.  Coding Language : ASP.NET, C#.Net.  Database : SQL Server 2005 REFERENCE: Sumeet Bajaj, Radu Sion “TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality” - IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 26, NO. 3, MARCH 2014