Advertisement

Distributed and Parallel Databases

, Volume 32, Issue 1, pp 37–63 | Cite as

MILo-DB: a personal, secure and portable database machine

  • Nicolas Anciaux
  • Luc Bouganim
  • Philippe Pucheral
  • Yanli Guo
  • Lionel Le Folgoc
  • Shaoyi Yin
Article

Abstract

Mass-storage secure portable tokens are emerging and provide a real breakthrough in the management of sensitive data. They can embed personal data and/or metadata referencing documents stored encrypted in the Cloud and can manage them under holder’s control. Mass on-board storage requires efficient embedded database techniques. These techniques are however very challenging to design due to a combination of conflicting NAND Flash constraints and scarce RAM constraint, disqualifying known state of the art solutions. To tackle this challenge, we proposes a log-only based storage organization and an appropriate indexing scheme, which (1) produce only sequential writes compatible with the Flash constraints and (2) consume a tiny amount of RAM, independent of the database size. We show the effectiveness of this approach through a comprehensive performance study.

Keywords

Embedded database Secure and privacy aware data management Secure chip Flash memory Tiny RAM Log-only database structure 

Notes

Acknowledgements

This work has been partially funded by the French ANR KISS project under grant No. ANR-11-INSE-0005. The authors also wish to thank Philippe Bonnet for his accurate comments on early versions of this paper.

References

  1. 1.
    Agrawal, D., Abbadi, A.E., Wang, S.: Secure data management in the cloud. In: DNIS (2011) Google Scholar
  2. 2.
    Agrawal, D., Ganesan, D., Sitaraman, R., Diao, Y., Singh, S.: Lazy-adaptive tree: an optimized index structure for flash devices. In: PVLDB (2009) Google Scholar
  3. 3.
    Allard, T., Anciaux, N., Bouganim, L., Guo, Y., Le Folgoc, L., Nguyen, B., Pucheral, P., Ray, I., Ray, I., Yin, S.: Secure personal data servers: a vision paper. In: PVLDB (2010) Google Scholar
  4. 4.
    Allard, T., Anciaux, N., Bouganim, L., Pucheral, P., Thion, R.: Trustworthiness of pervasive healthcare folders. In: Pervasive and Smart Technologies for Healthcare, Information Science Reference (2009) Google Scholar
  5. 5.
    Anciaux, N., Benzine, M., Bouganim, L., Pucheral, P., Shasha, D.: Revelation on demand. In: DAPD (2009) Google Scholar
  6. 6.
    Anciaux, N., Bouganim, L., Guo, Y., Pucheral, P., Vandewalle, J.J., Yin, S.: Pluggable personal data servers. In: SIGMOD (2010) Google Scholar
  7. 7.
    Arge, L.: The buffer tree: a technique for designing batched external data structures. Algorithmica (2003) Google Scholar
  8. 8.
    Bernstein, P., Reid, C., Das, S.: Hyder—a transactional record manager for shared flash. In: CIDR (2011) Google Scholar
  9. 9.
    Bityutskiy, A.B.: JFFS3 design issues. Tech. report (2005) Google Scholar
  10. 10.
    Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM (1970) Google Scholar
  11. 11.
    Bolchini, C., Salice, F., Schreiber, F., Tanca, L.: Logical and physical design issues for smart card databases. In: TOIS (2003) Google Scholar
  12. 12.
    Bursky, D.: Secure microcontrollers keep data safe. PRN engineering services (2012). http://tinyurl.com/secureMCU
  13. 13.
    Chan, C.Y., Ioannidis, Y.E.: An efficient bitmap encoding scheme for selection queries. In: SIGMOD (1999) Google Scholar
  14. 14.
    Debnath, B., Sengupta, S., Li, J.: SkimpyStash: RAM space skimpy key-value store on flash. In: SIGMOD (2011) Google Scholar
  15. 15.
    Elbaz, R., Champagne, D., Lee, R.B., Torres, L., Sassatelli, G., Guillemin, P.: TEC-tree: a low-cost, parallelizable tree for efficient defense against memory replay attacks. In: CHES (2007) Google Scholar
  16. 16.
    Eurosmart: Smart USB token. White paper (2008) Google Scholar
  17. 17.
    Gemmell, J., Bell, G., Lueder, R.: MyLifeBits: a personal database for everything. Commun. ACM 49(1) (2006) Google Scholar
  18. 18.
    Giesecke devrient: portable security token. http://www.gd-sfs.com/portable-security-token
  19. 19.
    Haas, L.M., Carey, M.J., Livny, M., Shukla, A.: Seeking the truth about ad hoc join costs. VLDB J. (1997) Google Scholar
  20. 20.
    Bonnet, P., Bouganim, L., Koltsidas, I., Viglas, S.D.: System co-design and date management for flash devices. In: PVLDB (2011) Google Scholar
  21. 21.
    Li, Y., He, B., Yang, R.J., Luo, Q., Yi, K.: Tree indexing on solid state drives. In: PVLDB (2010) Google Scholar
  22. 22.
    Li, Z., Ross, K.A.: Fast joins using join indices. VLDB J. (1999) Google Scholar
  23. 23.
    Lim, H., Fan, B., Andersen, D., Kaminsky, M.: SILT: a memory-efficient, high-performance key-value store. In: SOSP (2011) Google Scholar
  24. 24.
    Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A., Rivest, R.L.: Handbook of Applied Cryptography. CRC Press, Boca Raton (2001) Google Scholar
  25. 25.
    Moglen, E.: FreedomBox. http://freedomboxfoundation.org
  26. 26.
    Muth, P., O’Neil, P., Pick, A., Weikum, G.: The LHAM log-structured history data access method. VLDB J. (2000) Google Scholar
  27. 27.
    O’Neil, P., Cheng, E., Gawlick, D., O’Neil, E.: The log-structured merge-tree (LSM-tree). Acta Inform. (1996) Google Scholar
  28. 28.
    Pucheral, P., Bouganim, L., Valduriez, P., Bobineau, C.: PicoDBMS: scaling down database techniques for the smart card. VLDB J. (2001) Google Scholar
  29. 29.
    Rosenblum, M., Ousterhout, J.: The design and implementation of a log-structured file system. ACM Trans. Comput. Sci. (1992) Google Scholar
  30. 30.
    Schmid, P., Roos, A.: SDXC/SDHC memory cards, rounded up and benchmarked. http://tinyurl.com/tom-sdxc
  31. 31.
    Severance, D., Lohman, G.: Differential files: their application to the maintenance of large databases. ACM Trans. Database Syst. (1976) Google Scholar
  32. 32.
    Sundaresan, P.: General key indexes. US Patent No. 5870747 (1999) Google Scholar
  33. 33.
    Vo, H.T., Wang, S., Agrawal, D., Chen, G., Ooi, B.C.: LogBase: scalable log-structured storage system for write-heavy environments. Technical report (2012) Google Scholar
  34. 34.
    Weininger, A.: Efficient execution of joins in a star schema. In: SIGMOD (2002) Google Scholar
  35. 35.
    Wu, C., Chang, L., Kuo, T.: An efficient b-tree layer for flash-memory storage systems. In: RTCSA (2003) Google Scholar
  36. 36.
    Yin, S., Pucheral, P., Meng, X.: A sequential indexing scheme for flash-based embedded systems. In: EDBT (2009) Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Nicolas Anciaux
    • 1
    • 2
  • Luc Bouganim
    • 1
    • 2
  • Philippe Pucheral
    • 1
    • 2
  • Yanli Guo
    • 1
    • 2
  • Lionel Le Folgoc
    • 1
    • 2
  • Shaoyi Yin
    • 3
  1. 1.INRIA Paris-RocquencourtLe ChesnayFrance
  2. 2.PRISM LaboratoryUniversity of Versailles Saint-Quentin-En-YvelinesVersaillesFrance
  3. 3.University of Cergy PontoiseCergy-PontoiseFrance

Personalised recommendations