Do we need specialized graph databases? Benchmarking real-time social networking applications Pacaci et al., GRADES'17 Today's paper comes from the GRADES workshop co-located with SIGMOD. The authors take an established graph data management system benchmark suite (LDBC) and run it across a variety of graph and relational stores. The findings make for very interesting reading, … Continue reading Do we need specialized graph databases? Benchmarking real-time social networking applications
Category: Uncategorized
Using word embedding to enable semantic queries on relational databases
Using word embedding to enable semantic queries in relational databases Bordawekar and Shmeuli, DEEM'17 As I'm sure some of you have figured out, I've started to work through a collection of papers from SIGMOD'17. Strictly speaking, this paper comes from the DEEM workshop held in conjunction with SIGMOD, but it sparked my imagination and I … Continue reading Using word embedding to enable semantic queries on relational databases
Blockbench: a framework for analyzing private blockchains
Blockbench: a framework for analyzing private blockchains Dinh et al., SIGMOD'17 Here's a paper which delivers way more than you might expect from the title alone. First we get a good discussion of private blockchains and why interest in them is growing rapidly. Then the authors analyse the core layers in a private blockchain, and … Continue reading Blockbench: a framework for analyzing private blockchains
Azure Data Lake Store: a hyperscale distributed file service for big data analytics
Azure data lake store: a hyperscale distributed file service for big data analytics Douceur et al., SIGMOD'17 Today's paper takes us inside Microsoft Azure's distributed file service called the Azure Data Lake Store (ADLS). ADLS is the successor to an internal file system called Cosmos, and marries Cosmos semantics with HDFS, supporting both Cosmos and … Continue reading Azure Data Lake Store: a hyperscale distributed file service for big data analytics
Spanner: becoming a SQL system
Spanner: becoming a SQL system Bacon et al., SIGMOD'17 This week we'll start digging into some of the papers from SIGMOD'17. First up is a terrific 'update' paper on Google's Spanner which brings the story up to date in the five years since the original OSDI'12 paper. ... in many ways, today's Spanner is very … Continue reading Spanner: becoming a SQL system
Dhalion: self-regulating stream processing in Heron
Dhalion: Self-regulating stream processing in Heron Floratou et al., VLDB 2017 Dhalion follows on nicely from yesterday's paper looking at the modular architecture of Heron, and aims to reduce the "complexity of configuring, managing, and deploying" streaming applications. In particular, streaming applications deployed as Heron topologies, although the authors are keen to point out the … Continue reading Dhalion: self-regulating stream processing in Heron
Twitter Heron: towards extensible streaming engines
Twitter Heron: Towards extensible streaming engines Fu et al., ICDE 2017 We previously looked at the initial Twitter Heron paper that announced Heron to the world. In this ICDE 2017 paper, the team give us an update based on the work done since as a result of open-sourcing Heron. ... we discuss the challenges we … Continue reading Twitter Heron: towards extensible streaming engines
An experimental security analysis of an industrial robot controller
An experimental security analysis of an industrial robot controller Quarta et al., IEEE Security and Privacy 2017 This is an industrial robot: The International Federation of Robotics forecasts that, by 2018, approximately 1.3 million industrial robot units will be employed in factories globally, and the international market value for "robotized" systems is approximately 32 billion … Continue reading An experimental security analysis of an industrial robot controller
Hijacking Bitcoin: routing attacks on cryptocurrencies
Hijacking Bitcoin: routing attacks on cryptocurrencies Apostolaki et al., IEEE Security and Privacy 2017 The Bitcoin network has more than 6,000 nodes, responsible for up to 300,000 daily transactions and 16 million bitcoins valued at roughly $17B. Given the amount of money at stake, Bitcoin is an obvious target for attackers. This paper introduces a … Continue reading Hijacking Bitcoin: routing attacks on cryptocurrencies
SoK: Cryptographically protected database search
SoK: Cryptographically proctected database search Fuller et al., IEEE Security and Privacy 2017 This is a survey paper (Systematization of Knowledge, SoK) reviewing the current state of protected database search (encrypted databases). As such, it packs a lot of information into a relatively small space. As we've seen before, there are a wide-variety of cryptographic … Continue reading SoK: Cryptographically protected database search