US 12,455,881 B2
Secure query processing
Andrei Paduroiu, Bellevue, WA (US)
Assigned to Amazon Technologies, Inc., Seattle, WA (US)
Filed by Amazon Technologies, Inc., Seattle, WA (US)
Filed on Sep. 26, 2022, as Appl. No. 17/953,038.
Prior Publication US 2024/0104095 A1, Mar. 28, 2024
Int. Cl. G06F 16/2453 (2019.01); G06F 16/2455 (2019.01); G06F 21/62 (2013.01)
CPC G06F 16/24542 (2019.01) [G06F 16/2455 (2019.01); G06F 21/6227 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system, comprising:
at least one processor; and
at least one memory that stores computer-executable instructions that, in response to execution by the at least one processor, cause the system to:
identify a first portion of a query plan, the first portion indicative of executing a user-defined function;
identify a second portion of the query plan, the second portion indicative of accessing a database table associated with a security policy, wherein each of the first and the second portions of the query plan are to be executed by different computing nodes;
generate, based at least in part on:
the identification of the first and second portions, and
a security rule that prohibits the same computing node from executing user-defined functions and accessing the database table where security of the database table could be jeopardized by execution of user-defined functions at the same computing node,
an execution plan in which the first portion is to be performed in a first stage separate from a second stage of the execution plan in which the second portion is to be performed;
cause the first stage of the execution plan to be performed on a first computing node;
cause the second stage of the execution plan to be performed on a second computing node; and
provide a result of the query based, at least in part, on the performance of the first and second stages.