Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Open access

VeDB: A Software and Hardware Enabled Trusted Relational Database

Published: 20 June 2023 Publication History

Abstract

Blockchain-like ledger databases emerge in recent years as a more efficient alternative to permissioned blockchains. Conventional ledger databases mostly rely on authenticated structures such as the Merkle tree and transparency logs for supporting auditability, and hence they suffer from the performance problem. As opposed to conventional ledger DBMSes, we design VeDB - a high-performance verifiable software (Ve-S) and hardware (Ve-H) enabled DBMS with rigorous auditability for better user options and broad applications. In Ve-S, we devise a novel verifiable Shrubs array (VSA) with two-layer ordinals (serial numbers) which outperforms conventional Merkle tree-based models due to lower CPU and I/O cost. It enables rigorous auditability through its efficient credible timestamp range authentication method, and fine-grained data verification at the client side, which are lacking in state-of-the-art relational ledger databases. In Ve-H, we devise a non-intrusive trusted affiliation by TEE leveraging digest signing, monotonic counters, and trusted timestamps in VeDB, which supports both data notarization and lineage applications. The experimental results show that VeDB-VSA outperforms Merkle tree-based authenticated data structures (ADS) up to 70× and 3.7× for insertion and verification; and VeDB Ve-H data lineage verification is 8.5× faster than Ve-S.

Supplemental Material

MP4 File
We introduce VeDB as a software (Ve-S) and hardware (Ve-H) enabled trusted database. We devise a new append-only array-based authenticated data structure, distribute two-layer ordinals into an array structure, and decompose sparse sub-root set, as opposed to the conventional tree-based models. We present Ve-H, composed of TEE-assisted monotonic counters and trusted timestamps, to offer efficient data lineage application.

References

[1]
Carlisle Adams, Pat Cain, Denis Pinkas, and Robert Zuccherato. 2001. Internet X. 509 public key infrastructure time-stamp protocol (TSP). Technical Report.
[2]
Gluchowski Alex, Gurkan Kobi, Olszewski Marek, Tromer Eran, and Vlasov Alexander. 2019. Shrubs - A New Gas Efficient Privacy Protocol. https://archive.devcon.org/archive/watch/5/shrubs-a-new-gas-efficient-privacy-protocol/?tab=YouTube
[3]
Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, et al. 2018. Hyperledger fabric: a distributed operating system for permissioned blockchains. In Proceedings of the thirteenth EuroSys conference. 1--15.
[4]
Panagiotis Antonopoulos, Arvind Arasu, Kunal D Singh, Ken Eguro, Nitish Gupta, Rajat Jain, Raghav Kaushik, Hanuma Kodavalla, Donald Kossmann, Nikolas Ogg, et al. 2020. Azure SQL database always encrypted. In Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data. 1511--1525.
[5]
Panagiotis Antonopoulos, Raghav Kaushik, Hanuma Kodavalla, Sergio Rosales Aceves, Reilly Wong, Jason Anderson, and Jakub Szymaszek. 2021. SQL Ledger: Cryptographically Verifiable Data in Azure SQL Database. In Proceedings of the 2021 International Conference on Management of Data. 2437--2449.
[6]
Arvind Arasu, Spyros Blanas, Ken Eguro, Manas Joglekar, Raghav Kaushik, Donald Kossmann, Ravi Ramamurthy, Prasang Upadhyaya, and Ramarathnam Venkatesan. 2013. Secure database-as-a-service with cipherbase. In Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data. 1033--1036.
[7]
The Ethereum Association. 2022. PATRICIA MERKLE TREES. https://ethereum.org/developers/docs/data-structures-and-encoding/patricia-merkle-trie/
[8]
AWS. 2018. Amazon quantum ledger database (qldb). https://aws.amazon.com/qldb
[9]
AWS. 2022. Amazon Managed Blockchain. https://aws.amazon.com/blockchain
[10]
Michael Backes, Dario Fiore, and Raphael M Reischuk. 2013. Verifiable delegation of computation on outsourced data. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. 863--874.
[11]
Sumeet Bajaj and Radu Sion. 2013a. CorrectDB: SQL engine with practical query authentication. Proceedings of the VLDB Endowment, Vol. 6, 7 (2013), 529--540.
[12]
Sumeet Bajaj and Radu Sion. 2013b. TrustedDB: A trusted hardware-based database with privacy and data confidentiality. IEEE Transactions on Knowledge and Data Engineering, Vol. 26, 3 (2013), 752--765.
[13]
Abdeljalil Beniiche. 2020. A study of blockchain oracles. arXiv preprint arXiv:2004.07140 (2020).
[14]
D Bider and M Baushke. 2012. SHA-2 data integrity verification for the secure shell (SSH) transport layer protocol. Technical Report.
[15]
Vitalik Buterin et al. 2014. A next-generation smart contract and decentralized application platform. white paper, Vol. 3, 37 (2014), 2--1.
[16]
ByteDance. 2022. Make Your Day - TikTok. https://www.tiktok.com/
[17]
ByteDance. 2023. Volcengine. https://github.com/volcengine
[18]
Zhichao Cao, Siying Dong, Sagar Vemuri, and David HC Du. 2020. Characterizing, Modeling, and Benchmarking $$RocksDB$$$$Key-Value$$ Workloads at Facebook. In 18th USENIX Conference on File and Storage Technologies (FAST 20). 209--223.
[19]
Miguel Castro, Barbara Liskov, et al. 1999. Practical byzantine fault tolerance. In OSDI, Vol. 99. 173--186.
[20]
Shanwei Cen and Bo Zhang. 2017. Trusted time and monotonic counters with intel software guard extensions platform services. Online at: https://software. intel. com/sites/default/files/managed/1b/a2/Intel-SGX-Platform-Services. pdf (2017).
[21]
Alibaba Cloud. 2022. Alibaba Blockchain as a Service. https://www.alibabacloud.com/product/baas
[22]
Beijing Internet Court. 2023. Beijing Internet Court. https://english.bjinternetcourt.gov.cn
[23]
Yigal Edery and Rajeev Sharma. 2020. OCP Security Announces version 1.0 specs for Root of Trust. https://www.opencompute.org/blog/ocp-security-announces-version-10-specs-for-root-of-trust
[24]
Muhammad El-Hindi, Carsten Binnig, Arvind Arasu, Donald Kossmann, and Ravi Ramamurthy. 2019. BlockchainDB: A shared database on blockchains. Proceedings of the VLDB Endowment, Vol. 12, 11 (2019), 1597--1609.
[25]
Zachary Amsden et al. 2019. The Libra Blockchain. The Libra Association. https://mitsloan.mit.edu/shared/ods/documents?PublicationDocumentID=5859
[26]
David Ferraiolo, Janet Cugini, D Richard Kuhn, et al. 1995. Role-based access control (RBAC): Features and motivations. In Proceedings of 11th annual computer security application conference. 241--48.
[27]
Gartner. 2020. Gartner Top 10 Trends in Data and Analytics for 2020. https://www.gartner.com/smarterwithgartner/gartner-top-10-trends-in-data-and-analytics-for-2020
[28]
Sanjay Ghemawat and Jeff Dean. 2014. Leveldb is a fast key-value storage library written at google that provides an ordered mapping from string keys to string values.
[29]
Mike Hearn and Richard Gendal Brown. 2016. Corda: A distributed ledger. Corda Technical White Paper, Vol. 2016 (2016). https://www.corda.net/content/corda-technical-whitepaper.pdf
[30]
IBM. 2021. CODEPAGE option syntax. https://www.ibm.com/docs/en/cobol-zos/6.3?topic=options-codepage
[31]
IBM. 2022. IBM Blockchain. https://www.ibm.com/blockchain
[32]
R Intel. 2020. Software guard extensions sdk developer reference for linux* os. (2020).
[33]
Taehoon Kim, Joongun Park, Jaewook Woo, Seungheun Jeon, and Jaehyuk Huh. 2019. Shieldstore: Shielded in-memory key-value storage with sgx. In Proceedings of the Fourteenth EuroSys Conference 2019. 1--15.
[34]
John Kuszmaul. 2019. Verkle trees. Verkle Trees, Vol. 1 (2019).
[35]
SQL Maria. 2021. Why Oracle Implement Blockchain in the Database. https://sqlmaria.com/2021/03/03/why-oracle-implement-blockchain-in-the-database
[36]
Charles Martel, Glen Nuckolls, Premkumar Devanbu, Michael Gertz, April Kwong, and Stuart G Stubblebine. 2004. A general model for authenticated data structures. Algorithmica, Vol. 39, 1 (2004), 21--41.
[37]
Sinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, and Srdjan Capkun. 2019. $$BITE$$: Bitcoin lightweight client privacy using trusted execution. In 28th USENIX Security Symposium (USENIX Security 19). 783--800.
[38]
Trent McConaghy, Rodolphe Marques, Andreas Müller, Dimitri De Jonghe, Troy McConaghy, Greg McMullen, Ryan Henderson, Sylvain Bellemare, and Alberto Granzotto. 2016. Bigchaindb: a scalable blockchain database. white paper, BigChainDB (2016).
[39]
Ralph C Merkle. 2019. Protocols for public key cryptosystems. In Secure communications and asymmetric cryptosystems. Routledge, 73--104.
[40]
Andrew Miller, Michael Hicks, Jonathan Katz, and Elaine Shi. 2014. Authenticated data structures, generically. ACM SIGPLAN Notices, Vol. 49, 1 (2014), 411--423.
[41]
Arun Prasad Mohan, Angelin Gladston, et al. 2020. Merkle tree and Blockchain-based cloud data auditing. International Journal of Cloud Applications and Computing (IJCAC), Vol. 10, 3 (2020), 54--66.
[42]
JP Morgan. 2016. Quorum whitepaper. New York: JP Morgan Chase (2016).
[43]
Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review (2008). https://bitcoin.org/bitcoin.pdf
[44]
National University of Singapore. 2022. Ledger Database. https://github.com/nusdbsystem/LedgerDatabase
[45]
The Horizon 2020 Framework Programme of the European Union. 2020. Everything you need to know about the Right to be forgotten. https://gdpr.eu/right-to-be-forgotten
[46]
Oleksii Oleksenko, Bohdan Trach, Robert Krahn, Mark Silberstein, and Christof Fetzer. 2018. Varys: Protecting $$SGX$$ Enclaves from Practical $$Side-Channel$$ Attacks. In 2018 USENIX Annual Technical Conference (USENIX ATC 18). 227--240.
[47]
Oracle. 2022. Blockchain Tables in Oracle Database 21c. https://oracle-base.com/articles/21c/blockchain-tables-21c
[48]
Patrick O'Neil, Edward Cheng, Dieter Gawlick, and Elizabeth O'Neil. 1996. The log-structured merge-tree (LSM-tree). Acta Informatica, Vol. 33, 4 (1996), 351--385.
[49]
Raluca Ada Popa, Catherine MS Redfield, Nickolai Zeldovich, and Hari Balakrishnan. 2011. CryptDB: protecting confidentiality with encrypted query processing. In Proceedings of the twenty-third ACM symposium on operating systems principles. 85--100.
[50]
Christian Priebe, Kapil Vaswani, and Manuel Costa. 2018. EnclaveDB: A secure database using SGX. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 264--278.
[51]
Provendb. 2020. Provendb: A blockchain enabled database service. https://provendb.com/litepaper
[52]
Ronald L Rivest, Adi Shamir, and Leonard Adleman. 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, Vol. 21, 2 (1978), 120--126.
[53]
Nathan Senthil, Govindarajan Chander, Saraf Adarsh, et al. 2019. Blockchain meets database: design and implementation of a blockchain relational database [J]. In Proceedings of the VLDB Endowment, Vol. 12. 1539--1552.
[54]
Rohit Sinha and Mihai Christodorescu. 2018. Veritasdb: High throughput key-value store with integrity. Cryptology ePrint Archive (2018).
[55]
Paul Snow, Brian Deery, Jack Lu, David Johnston, Peter Kirby, Andrew Yashchuk Sprague, and Dustin Byington. 2014. Business processes secured by immutable audit trails on the blockchain. Brave New Coin (2014).
[56]
Roberto Tamassia. 2003. Authenticated data structures. In European symposium on algorithms. Springer, 2--5.
[57]
Stephan van Schaik, Marina Minkin, Andrew Kwong, Daniel Genkin, and Yuval Yarom. 2021. CacheOut: Leaking data on Intel CPUs via cache evictions. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 339--354.
[58]
Dhinakaran Vinayagamurthy, Alexey Gribov, and Sergey Gorbunov. 2019. StealthDB: a Scalable Encrypted Database with Full SQL Query Support. Proc. Priv. Enhancing Technol., Vol. 2019, 3 (2019), 370--388.
[59]
Paul Voigt and Axel Von dem Bussche. 2017. The eu general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing, Vol. 10, 3152676 (2017), 10--5555.
[60]
Jinwen Wang, Ao Li, Haoran Li, Chenyang Lu, and Ning Zhang. 2022. RT-TEE: Real-time System Availability for Cyber-physical Systems using ARM TrustZone. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 1573--1573.
[61]
Samuel Weiser, Mario Werner, Ferdinand Brasser, Maja Malenko, Stefan Mangard, and Ahmad-Reza Sadeghi. 2019. Timber-v: Tag-isolated memory bringing fine-grained enclaves to risc-v. In NDSS.
[62]
Ofir Weisse, Valeria Bertacco, and Todd Austin. 2017. Regaining lost cycles with HotCalls: A fast interface for SGX secure enclaves. ACM SIGARCH Computer Architecture News, Vol. 45, 2 (2017), 81--93.
[63]
Wikepedia. 2022. Hangzhou Internet Court. https://en.wikipedia.org/wiki/Hangzhou_Internet_Court
[64]
Wikimedia. 2021. Block Range Index. https://en.wikipedia.org/wiki/Block_Range_Index
[65]
Cheng Xu, Ce Zhang, and Jianliang Xu. 2019. vchain: Enabling verifiable boolean range queries over blockchain databases. In Proceedings of the 2019 international conference on management of data. 141--158.
[66]
Xinying Yang. 2020. Blockchain-based music originality analysis method and apparatus. US Patent 10,628,485.
[67]
Xinying Yang, Sheng Wang, Feifei Li, Yuan Zhang, Wenyuan Yan, Fangyu Gai, Benquan Yu, Likai Feng, Qun Gao, and Yize Li. 2022. Ubiquitous Verification in Centralized Ledger Database. In 2022 IEEE 38th International Conference on Data Engineering (ICDE). IEEE, 1808--1821.
[68]
Xinying Yang, Yuan Zhang, Sheng Wang, Benquan Yu, Feifei Li, Yize Li, and Wenyuan Yan. 2020. LedgerDB: A centralized ledger database for universal audit and verification. Proceedings of the VLDB Endowment, Vol. 13, 12 (2020), 3138--3151.
[69]
Meihui Zhang, Zhongle Xie, Cong Yue, and Ziyue Zhong. 2020. Spitz: A Verifiable Database System. Proceedings of the VLDB Endowment, Vol. 13, 12 (2020).

Cited By

View all
  • (2024)Blockchain-Enabled Construction and Demolition Waste Management: Advancing Information Management for Enhanced Sustainability and EfficiencySustainability10.3390/su1602072116:2(721)Online publication date: 14-Jan-2024
  • (2024)TC-Match: Fast Time-Constrained Continuous Subgraph MatchingProceedings of the VLDB Endowment10.14778/3681954.368196317:11(2791-2804)Online publication date: 30-Aug-2024
  • (2024)BT-Tree: A Reinforcement Learning Based Index for Big Trajectory DataProceedings of the ACM on Management of Data10.1145/36771302:4(1-27)Online publication date: 30-Sep-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Management of Data
Proceedings of the ACM on Management of Data  Volume 1, Issue 2
PACMMOD
June 2023
2310 pages
EISSN:2836-6573
DOI:10.1145/3605748
Issue’s Table of Contents
This work is licensed under a Creative Commons Attribution International 4.0 License.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 June 2023
Published in PACMMOD Volume 1, Issue 2

Author Tags

  1. authenticated data structures
  2. blockchain
  3. blockchain-like databases
  4. database security
  5. databases
  6. ledger databases
  7. relational databases
  8. trusted execution environment

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)850
  • Downloads (Last 6 weeks)88
Reflects downloads up to 01 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Blockchain-Enabled Construction and Demolition Waste Management: Advancing Information Management for Enhanced Sustainability and EfficiencySustainability10.3390/su1602072116:2(721)Online publication date: 14-Jan-2024
  • (2024)TC-Match: Fast Time-Constrained Continuous Subgraph MatchingProceedings of the VLDB Endowment10.14778/3681954.368196317:11(2791-2804)Online publication date: 30-Aug-2024
  • (2024)BT-Tree: A Reinforcement Learning Based Index for Big Trajectory DataProceedings of the ACM on Management of Data10.1145/36771302:4(1-27)Online publication date: 30-Sep-2024
  • (2024)In-depth Analysis of Continuous Subgraph Matching in a Common Delta Query Compilation FrameworkProceedings of the ACM on Management of Data10.1145/36549502:3(1-27)Online publication date: 30-May-2024
  • (2024)Fast Query of Biharmonic Distance in NetworksProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3671856(1887-1897)Online publication date: 25-Aug-2024
  • (2024)Machine Learning for Databases: Foundations, Paradigms, and Open problemsCompanion of the 2024 International Conference on Management of Data10.1145/3626246.3654686(622-629)Online publication date: 9-Jun-2024
  • (2024)Intelligent Gesture-Enhanced Blockchain Voting: A New Era of Secure and Accessible E-VotingIEEE Access10.1109/ACCESS.2024.346833812(144055-144068)Online publication date: 2024
  • (2024)Privacy-Preserving Federated Learning for Intrusion Detection in IoT Environments: A SurveyIEEE Access10.1109/ACCESS.2024.345421112(127018-127050)Online publication date: 2024
  • (2024)A Study on Privacy Protection of Cross-Chain Transactions Based on Improved Notary MechanismsIEEE Access10.1109/ACCESS.2024.342547512(95846-95856)Online publication date: 2024
  • (2024)RLKS-TMS: A Robust and Lightweight Key Agreement Scheme for Telemedicine SystemIEEE Access10.1109/ACCESS.2024.342203812(108233-108247)Online publication date: 2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media