EnclaveDB: A secure database using SGX

C Priebe, K Vaswani, M Costa - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
We propose EnclaveDB, a database engine that guarantees confidentiality, integrity, and
freshness for data and queries. EnclaveDB guarantees these properties even when the …

Path ORAM: an extremely simple oblivious RAM protocol

E Stefanov, M Dijk, E Shi, THH Chan… - Journal of the ACM …, 2018 - dl.acm.org
We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …

Terra: A virtual machine-based platform for trusted computing

T Garfinkel, B Pfaff, J Chow, M Rosenblum… - Proceedings of the …, 2003 - dl.acm.org
We present a flexible architecture for trusted computing, called Terra, that allows
applications with a wide range of security requirements to run simultaneously on commodity …

XPIR: Private information retrieval for everyone

CA Melchor, J Barrier, L Fousse… - Proceedings on Privacy …, 2016 - hal.science
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record
from a database while hiding which from the database administrators. PIR can be achieved …

TrustedDB: a trusted hardware based database with privacy and data confidentiality

S Bajaj, R Sion - Proceedings of the 2011 ACM SIGMOD International …, 2011 - dl.acm.org
TrustedDB is an outsourced database prototype that allows clients to execute SQL queries
with privacy and under regulatory compliance constraints without having to trust the service …

Oblivistore: High performance oblivious cloud storage

E Stefanov, E Shi - 2013 IEEE Symposium on Security and …, 2013 - ieeexplore.ieee.org
We design and build ObliviStore, a high performance, distributed ORAM-based cloud data
store secure in the malicious model. To the best of our knowledge, ObliviStore is the fastest …

[PDF][PDF] On the computational practicality of private information retrieval

R Sion, B Carbunar - Proceedings of the network and distributed systems …, 2007 - zxr.io
We explore the limits of single-server computational private information retrieval (PIR) for the
purpose of preserving client access patterns leakage. We show that deployment of non …

Multi-cloud oblivious storage

E Stefanov, E Shi - Proceedings of the 2013 ACM SIGSAC conference …, 2013 - dl.acm.org
We present a 2-cloud oblivious storage (ORAM) system that achieves 2.6 X bandwidth cost
between the client and the cloud. Splitting an ORAM across 2 or more non-colluding clouds …

[PDF][PDF] An empirical study into the security exposure to hosts of hostile virtualized environments

T Ormandy - 2007 - Citeseer
As virtual machines become increasingly commonplace as a method of separating hostile or
hazardous code from commodity systems, the potential security exposure from …

Scalable and private media consumption with Popcorn

T Gupta, N Crooks, W Mulhern, S Setty, L Alvisi… - … USENIX symposium on …, 2016 - usenix.org
We describe the design, implementation, and evaluation of Popcorn, a media delivery
system that hides clients' consumption (even from the content distributor). Popcorn relies on …