-
公开(公告)号:US11157495B2
公开(公告)日:2021-10-26
申请号:US16519489
申请日:2019-07-23
Applicant: International Business Machines Corporation
Inventor: Akshar Kaul , Gagandeep Singh , Hong Min , Manish Kesarwani
IPC: G06F16/2453 , G06F21/60 , G06F16/2455
Abstract: Methods, systems, and computer program products for dynamically managing predicate expression columns in an encrypted database are provided herein. A computer-implemented method includes dynamically parsing a query into multiple query predicate expressions; determining that one or more of the query predicate expressions require materialization in an encryption scheme compatible with operations in the predicate expressions; comparing (i) an amount of storage capacity to be consumed by materializing the one or more query predicate expressions to (ii) an amount of available storage budget for materialized columns in one or more databases; upon a determination that the amount of storage capacity to be consumed exceeds the amount of available storage budget, removing at least one existing materialized column from the databases; materializing the query predicate expressions by materializing one or more rows required for execution of the query; and executing the query based on the materialized query predicate expressions.
-
公开(公告)号:US20210133162A1
公开(公告)日:2021-05-06
申请号:US16672312
申请日:2019-11-01
Applicant: International Business Machines Corporation
Inventor: Matthew R. Arnold , Rachel K.E. Bellamy , Kaoutar El Maghraoui , Michael Hind , Stephanie Houde , Kalapriya Kannan , Sameep Mehta , Aleksandra Mojsilovic , Ramya Raghavendra , Darrell C. Reimer , John T. Richards , David J. Piorkowski , Jason Tsay , Kush R. Varshney , Manish Kesarwani
Abstract: A method for automatically generating documentation for an artificial intelligence model includes receiving, by a computing device, an artificial intelligence model. The computing device accesses a model facts policy that indicates data to be collected for artificial intelligence models. The computing device collects artificial intelligence model facts regarding the artificial intelligence model according to the model facts policy. The computing device accesses a factsheet template. The factsheet template provides a schema for an artificial intelligence model factsheet for the artificial intelligence model. The computing device populates the artificial intelligence model factsheet using the factsheet template with the artificial intelligence model facts related to the artificial intelligence model.
-
公开(公告)号:US10601580B2
公开(公告)日:2020-03-24
申请号:US15817972
申请日:2017-11-20
Applicant: International Business Machines Corporation
Inventor: Manish Kesarwani , Akshar Kaul , Sameep Mehta , Hong Min
Abstract: A processor may receive plaintext data. The plaintext data may correspond to a query. The processor may identify a granularity of the plaintext data. The processor may compress the plaintext data using a binary search tree. The binary search tree may compress the plaintext data based on the granularity of the plaintext data. The processor may encrypt the plaintext data by randomizing the order in which the binary search tree stores the compression of the plaintext data. The stored order of the binary search tree may act as a private key. The processor may process the query over an encrypted cumulative compressed database.
-
公开(公告)号:US20170300703A1
公开(公告)日:2017-10-19
申请号:US15132511
申请日:2016-04-19
Applicant: International Business Machines Corporation
Inventor: Prasad M. Deshpande , Jayant R. Haritsa , Akshar Kaul , Manish Kesarwani , Gagandeep Singh
CPC classification number: G06F21/6218 , G06F21/60 , G06F21/62 , H04L9/002 , H04L9/0618
Abstract: Methods, systems, and computer program products for securely processing range predicates on cloud databases are provided herein. A computer-implemented method includes separately encrypting a set of plain text data using two or more encryption functions, thereby producing an encrypted domain comprising at least two distinct groups of encrypted data items; converting a range query over plain text data items into a query over at least one of the distinct groups of encrypted data items; and combining results from the query over the distinct groups of encrypted data items, thereby generating a final encrypted result to the range query.
-
公开(公告)号:US20220138216A1
公开(公告)日:2022-05-05
申请号:US17084161
申请日:2020-10-29
Applicant: International Business Machines Corporation
Inventor: Manish Kesarwani , Sumit Bhatia , Sameep Mehta
IPC: G06F16/25 , G06F16/242 , G06F16/2457 , G06F16/2455
Abstract: One embodiment provides a computer implemented method, including: receiving, from a user, a natural language query for data contained within at least one data repository; identifying at least one concept from the natural language query, wherein the at least one concept includes an entity and an intent; identifying a plurality of datasets satisfying the natural language query by querying the at least one data repository utilizing the at least one concept; ranking the dataset based on relevance to the query; generating an extract-transform-load script that extracts, transforms, and loads a dataset selected by the user from the plurality of datasets; and retrieving data included in the dataset utilizing the extract-transform-load script, wherein the retrieving includes returning the data to the user.
-
公开(公告)号:US20200311287A1
公开(公告)日:2020-10-01
申请号:US16364926
申请日:2019-03-26
Applicant: International Business Machines Corporation
Inventor: Akshar Kaul , Diptikalyan Saha , Gagandeep Singh , Manish Kesarwani
IPC: G06F21/60 , G06F16/22 , G06F16/2455
Abstract: Methods, systems, and computer program products for generating a data migration plan for in-place encryption of data are provided herein. A computer-implemented method includes receiving, from a user, a request to generate a migration plan for performing in-place encryption of data within a database, wherein the migration plan indicates periods of time in which portions of the data are to be encrypted; determining a set of constraints for performing the in-place encryption; generating the migration plan based at least in part on the set of constraints; and performing the in-place encryption of the data in accordance with the migration plan such that only a single copy of each of the portions is maintained during the in-place encryption, wherein the single copy comprises one of a plaintext copy of data corresponding to the portion, and an encrypted copy of data corresponding to the portion.
-
公开(公告)号:US10700864B2
公开(公告)日:2020-06-30
申请号:US15648179
申请日:2017-07-12
Applicant: International Business Machines Corporation
Inventor: Spyridon Antonatos , Stefano Braghin , Akshar Kaul , Manish Kesarwani , Sameep Mehta
Abstract: Techniques facilitating autonomously rendering an encrypted data anonymous in a non-trusted environment are provided. In one example, a computer-implemented method can comprise generating, by a system operatively coupled to a processor, a plurality of clusters of encrypted data from an encrypted dataset using a machine learning algorithm. The computer-implemented method can also comprise modifying, by the system, the plurality of clusters based on a defined criterion that can facilitate anonymity of the encrypted data.
-
公开(公告)号:US20190362072A1
公开(公告)日:2019-11-28
申请号:US15986542
申请日:2018-05-22
Applicant: International Business Machines Corporation
Inventor: Manish Kesarwani , Atul Kumar , Vijay Arya , Rakesh R. Pimplikar , Sameep Mehta
Abstract: One embodiment provides a method for delaying malicious attacks on machine learning models that a trained using input captured from a plurality of users, including: deploying a model, said model designed to be used with an application, for responding to requests received from users, wherein the model comprises a machine learning model that has been previously trained using a data set; receiving input from one or more users; determining, using a malicious input detection technique, if the received input comprises malicious input; if the received input comprises malicious input, removing the malicious input from the input to be used to retrain the model; retraining the model using received input that is determined to not be malicious input; and providing, using the retrained model, a response to a received user query, the retrained model delaying the effect of malicious input on provided responses by removing malicious input from retraining input.
-
公开(公告)号:US20190355044A1
公开(公告)日:2019-11-21
申请号:US15981333
申请日:2018-05-16
Applicant: International Business Machines Corporation
Inventor: Akshar Kaul , Manish Kesarwani , Gagandeep Singh , Sameep Mehta
IPC: G06Q30/06
Abstract: One embodiment provides a method, including: receiving, at a data service provider, a request from an information purchaser, wherein the request comprises (i) a budget identifying an amount of money to be spent on information and (ii) an objective function identifying a type of information that the information purchaser is requesting; accessing at least a subset of at least one information set of at least one information seller, wherein each of the at least one information sets comprises an information set available for purchase from the information seller; identifying whether at least one accessed information set that fulfills the received request; and providing, if at least one accessed information set fulfills the received request, a recommendation of an information set for purchase by the information purchaser, wherein the provided recommendation comprises at least one of the identified information sets that fulfills the received request.
-
公开(公告)号:US20190190695A1
公开(公告)日:2019-06-20
申请号:US15847181
申请日:2017-12-19
Applicant: International Business Machines Corporation
Inventor: Akshar Kaul , Manish Kesarwani , Sameep Mehta , Prasad G. Naldurg , Gagandeep Singh
Abstract: One embodiment provides a method, including: receiving, from a data owner, an input string of plaintext data comprising a plurality of characters for storage in a database of a third-party storage provider; arranging the plurality of characters of the input string as a half pyramid, wherein the half pyramid comprises a plurality of rows, each row comprising at least one more character than a preceding row; encrypting, using a secure encryption scheme and based upon a key, each row of the half pyramid independently from each other row of the half pyramid; and storing, in the database of the third-party storage provider, the encrypted rows of the half pyramid. Other aspects are claimed and described.
-
-
-
-
-
-
-
-
-