Query processing in blockchain systems: Current state and future challenges

D Przytarski, C Stach, C Gritti, B Mitschang - Future Internet, 2021 - mdpi.com
When, in 2008, Satoshi Nakamoto envisioned the first distributed database management
system that relied on cryptographically secured chain of blocks to store data in an immutable …

A survey on the efficiency, reliability, and security of data query in blockchain systems

Q Zhang, Y He, R Lai, Z Hou, G Zhao - Future Generation Computer …, 2023 - Elsevier
With the emergence of digital currencies, blockchain systems have been committed to the
efficient and trusted storage of data, building decentralized, tamper-proof, persistent, and …

vChain+: Optimizing verifiable blockchain boolean range queries

H Wang, C Xu, C Zhang, J Xu… - 2022 IEEE 38th …, 2022 - ieeexplore.ieee.org
Blockchain has recently gained massive attention thanks to the success of cryptocurrencies
and decentralized applications. With immutability and tamper-resistance features, it can be …

Adore: Differentially oblivious relational database operators

L Qin, R Jayaram, E Shi, Z Song, D Zhuo… - arXiv preprint arXiv …, 2022 - arxiv.org
There has been a recent effort in applying differential privacy on memory access patterns to
enhance data privacy. This is called differential obliviousness. Differential obliviousness is a …

Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

Symgx: Detecting cross-boundary pointer vulnerabilities of sgx applications via static symbolic execution

Y Wang, Z Zhang, N He, Z Zhong, S Guo… - Proceedings of the …, 2023 - dl.acm.org
Intel Security Guard Extensions (SGX) have shown effectiveness in critical data protection.
Recent symbolic execution-based techniques reveal that SGX applications are susceptible …

Zero-knowledge proof meets machine learning in verifiability: A survey

Z Xing, Z Zhang, J Liu, Z Zhang, M Li, L Zhu… - arXiv preprint arXiv …, 2023 - arxiv.org
With the rapid advancement of artificial intelligence technology, the usage of machine
learning models is gradually becoming part of our daily lives. High-quality models rely not …

GlassDB: An efficient verifiable ledger database system through transparency

C Yue, TTA Dinh, Z Xie, M Zhang, G Chen… - arXiv preprint arXiv …, 2022 - arxiv.org
Verifiable ledger databases protect data history against malicious tampering. Existing
systems, such as blockchains and certificate transparency, are based on transparency logs …

Zksql: Verifiable and efficient query evaluation with zero-knowledge proofs

X Li, C Weng, Y Xu, X Wang, J Rogers - Proceedings of the VLDB …, 2023 - par.nsf.gov
Individuals and organizations are using databases to store personal information at an
unprecedented rate. This creates a quandary for data providers. They are responsible for …

A framework for privacy preserving localized graph pattern query processing

L Xu, B Choi, Y Peng, J Xu, SS Bhowmick - Proceedings of the ACM on …, 2023 - dl.acm.org
This paper studies privacy preserving graph pattern query services in a cloud computing
paradigm. In such a paradigm, data owner stores the large data graph to a powerful cloud …