Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ravishankar Ramamurthy is active.

Publication


Featured researches published by Ravishankar Ramamurthy.


international conference on management of data | 2004

Estimating progress of execution for SQL queries

Surajit Chaudhuri; Vivek R. Narasayya; Ravishankar Ramamurthy

Todays database systems provide little feedback to the user/DBA on how much of a SQL querys execution has been completed. For long running queries, such feedback can be very useful, for example, to help decide whether the query should be terminated or allowed to run to completion. Although the above requirement is easy to express, developing a robust indicator of progress for query execution is challenging. In this paper, we study the above problem and present techniques that can form the basis for effective progress estimation. The results of experimentally validating our techniques in Microsoft SQL Server are promising.


international conference on management of data | 2006

Redundancy and information leakage in fine-grained access control

Govind Kabra; Ravishankar Ramamurthy; S. Sudarshan

The current SQL standard for access control is coarse grained, in that it grants access to all rows of a table or none. Fine-grained access control, which allows control of access at the granularity of individual rows, and to specific columns within those rows, is required in practically all database applications. There are several models for fine grained access control, but the majority of them follow a view replacement strategy. There are two significant problems with most implementations of the view replacement model, namely (a) the unnecessary overhead of the access control predicates when they are redundant and (b) the potential of information leakage through channels such as user-defined functions, and operations that cause exceptions and error messages. We first propose techniques for redundancy removal. We then define when a query plan is safe with respect to UDFs and other unsafe functions, and propose techniques to generate safe query plans. We have prototyped redundancy removal and safe UDF pushdown on the Microsoft SQL Server query optimizer, and present a preliminary performance study.


international conference on data engineering | 2009

Power Hints for Query Optimization

Nicolas Bruno; Surajit Chaudhuri; Ravishankar Ramamurthy

Commercial database systems expose query hints to address situations in which the optimizer chooses a poor plan for a given query. However, current query hints are not flexible enough to deal with a variety of non-trivial scenarios. In this paper, we introduce a hinting framework that enables the specification of rich constraints to influence the optimizer to pick better plans. We show that while our framework unifies previous approaches, it goes considerably beyond existing hinting mechanisms, and can be implemented efficiently with moderate changes to current optimizers.


international conference on management of data | 2013

Secure database-as-a-service with Cipherbase

Arvind Arasu; Spyros Blanas; Ken Eguro; Manas Joglekar; Raghav Kaushik; Donald Kossmann; Ravishankar Ramamurthy; Prasang Upadhyaya; Ramarathnam Venkatesan

Data confidentiality is one of the main concerns for users of public cloud services. The key problem is protecting sensitive data from being accessed by cloud administrators who have root privileges and can remotely inspect the memory and disk contents of the cloud servers. While encryption is the basic mechanism that can leveraged to provide data confidentiality, providing an efficient database-as-a-service that can run on encrypted data raises several interesting challenges. In this demonstration we outline the functionality of Cipherbase --- a full fledged SQL database system that supports the full generality of a database system while providing high data confidentiality. Cipherbase has a novel architecture that tightly integrates custom-designed trusted hardware for performing operations on encrypted data securely such that an administrator cannot get access to any plaintext corresponding to sensitive data.


international conference on management of data | 2014

Querying encrypted data

Arvind Arasu; Ken Eguro; Raghav Kaushik; Ravishankar Ramamurthy

Data security is a serious concern when we migrate data to a cloud DBMS. Database encryption, where sensitive columns are encrypted before they are stored in the cloud, has been proposed as a mechanism to address such data security concerns. The intuitive expectation is that an adversary cannot “learn” anything about the encrypted columns, since she does not have access to the encryption key. However, query processing becomes a challenge since it needs to “look inside” the data. This tutorial explores the space of designs studied in prior work on processing queries over encrypted data. We cover approaches based on both classic client-server and involving the use of a trusted hardware module where data can be securely decrypted. We discuss the privacy challenges that arise in both approaches and how they may be addressed. Briefly, supporting the full complexity of a modern DBMS including complex queries, transactions and stored procedures leads to significant challenges that we survey.


international conference on management of data | 2011

Efficient auditing for complex SQL queries

Raghav Kaushik; Ravishankar Ramamurthy

We address the problem of data auditing that asks for an audit trail of all users and queries that potentially breached information about sensitive data. A lot of the previous work in data auditing has focused on providing strong privacy guarantees and studied the class of queries that can be audited efficiently while retaining the guarantees. In this paper, we approach data auditing from a different perspective. Our goal is to design an auditing system for arbitrary SQL queries containing constructs such as grouping, aggregation and correlated subqueries. Pivoted on the ability to feasibly address arbitrary queries, we study (1)~what privacy guarantees we can expect, and (2)~how we can efficiently perform auditing.


international conference on data engineering | 2008

Diagnosing Estimation Errors in Page Counts Using Execution Feedback

Surajit Chaudhuri; Vivek R. Narasayya; Ravishankar Ramamurthy

Errors in estimating page counts can lead to poor choice of access methods and in turn to poor quality plans. Although there is past work in using execution feedback for accurate cardinality estimation, the problem of inaccurate estimation of page counts has not been addressed. In this paper, we present novel mechanisms for diagnosing errors in page count by monitoring query execution at low overhead. Detection of inaccuracy in the optimizer estimates of page count can be leveraged by database administrators to improve plan quality. We have prototyped our techniques in the Microsoft SQL Server engine, and our experiments demonstrate the ability to estimate page counts accurately using execution feedback with low overhead. For queries on several real world databases, we observe significant improvement in plan quality when page counts obtained from execution feedback are used instead of the traditional optimizer estimations.


very large data bases | 2002

Chapter 38 – A Case for Fractured Mirrors

Ravishankar Ramamurthy; David J. DeWitt; Qi Su

Publisher Summary The decomposition storage model (DSM) has not found acceptance by the database vendors. Given technology trends and the need for storage architectures that are more aware of disk-arm and cache effects during query processing, DSM is likely to play an important role in the future. A number of the fundamental assumptions upon which the current generation of database systems is based have changed dramatically over the past decade. CPU speeds are improving rapidly and the amount of main memory that is affordable is increasing. While disk capacities have also shown similar improvements, disk times and effective transfer rates (transfer rate/capacity) have improved at a much slower rate (almost a factor of 10 slower). In addition, since it appears that disk capacities are growing faster than database sizes, even the benefits of using parallelism are likely to diminish.


international conference on management of data | 2009

A framework for testing query transformation rules

Hicham G. Elmongui; Vivek R. Narasayya; Ravishankar Ramamurthy

In order to enable extensibility, modern query optimizers typically leverage a transformation rule based framework. Testing individual rule correctness as well as correctness of rule interactions is crucial in verifying the functionality of a query optimizer. While there has been a lot of work on how to architect optimizers for extensibility using a rule based framework, there has been relatively little work on how to test such optimizers. In this paper we present a framework for testing query transformation rules which enables: (a) efficient generation of queries that exercise a particular transformation rule or a set of rules and (b) efficient execution of corresponding test suites for correctness testing.


Proceedings of the ACM 2000 conference on Java Grande | 2000

JavaGenes and Condor: cycle-scavenging genetic algorithms

Al Globus; Eric Langhirt; Miron Livny; Ravishankar Ramamurthy; Marvin H. Solomon; Steve Traugott

A genetic algorithm code, JavaGenes, was written in Java and used to evolve pharmaceutical drug molecules and digital circuits. JavaGenes was run under the Condor cyclescavenging batch system managing 100-170 desktop, deskside, and rack-mounted SGI workstations. Genetic algorithms mimic biological evolution by evolving solutions to problems using crossover and mutation. While most genetic algorithms evolve strings or trees, JavaGenes evolves graphs representing (currently) molecules and circuits. Java was chosen as the implementation language because the genetic algorithm requires random splitting and recombining of graphs, a complex data structure manipulation with ample opportunities for memory leaks, loose pointers, out-of-bound indices, and other hard to find bugs. Java garbage-collection memory management, lack of pointer arithmetic, and arraybounds index checking reduces the frequency of these bugs, substantially reducing development time. While a run-time performance penalty must be paid, the only unacceptable performance we encountered was using standard Java serialization to checkpoint and restart the code. This was fixed by a two-day implementation of custom checkpointing. JavaGenes is minimally integrated with Condor; in other

Collaboration


Dive into the Ravishankar Ramamurthy's collaboration.

Researchain Logo
Decentralizing Knowledge