Enabling intensional access control via preference-aware query optimization

Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Although the declarative nature of SQL provides great utility to database users, its use in distributed database management systems can result in unintended consequences to user privacy over the course of query evaluation. By allowing users to merely say what data they are interested in accessing without providing guidance regarding how to retrieve it, query optimizers can generate plans that leak sensitive query intension. To address these types of issues, we have created a framework that empowers users with the ability to specify access controls on the intension of their queries through extensions to the SQL SELECT statement. In this demonstration, we present a version of PostgreSQL's query optimizer that we have modified to produce plans that respect these constraints while optimizing user-specified SQL queries in terms of performance.

Original languageEnglish
Title of host publicationSACMAT 2013 - Proceedings of the 18th ACM Symposium on Access Control Models and Technologies
Pages189-192
Number of pages4
DOIs
Publication statusPublished - 2 Sep 2013
Event18th ACM Symposium on Access Control Models and Technologies, SACMAT 2013 - Amsterdam, Netherlands
Duration: 12 Jun 201314 Jun 2013

Publication series

NameProceedings of ACM Symposium on Access Control Models and Technologies, SACMAT

Other

Other18th ACM Symposium on Access Control Models and Technologies, SACMAT 2013
CountryNetherlands
CityAmsterdam
Period12/6/1314/6/13

    Fingerprint

Keywords

  • Distributed databases
  • Preference SQL
  • Privacy
  • Query optimization

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality
  • Information Systems

Cite this

Farnan, N. L., Lee, A. J., Chrysanthis, P. K., & Yu, T. (2013). Enabling intensional access control via preference-aware query optimization. In SACMAT 2013 - Proceedings of the 18th ACM Symposium on Access Control Models and Technologies (pp. 189-192). (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT). https://doi.org/10.1145/2462410.2462428