Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges

J Domingo-Ferrer, O Farras, J Ribes-González… - Computer …, 2019 - Elsevier
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …

Secure searchable encryption: a survey

Y Wang, J Wang, X Chen - Journal of communications and information …, 2016 - Springer
Cloud computing facilitates convenient and on-demand network access to a centralized pool
of resources. Currently, many users prefer to outsource data to the cloud in order to mitigate …

New constructions for forward and backward private symmetric searchable encryption

J Ghareh Chamani, D Papadopoulos… - Proceedings of the …, 2018 - dl.acm.org
We study the problem of dynamic symmetric searchable encryption. In that setting, it is
crucial to minimize the information revealed to the server as a result of update operations …

Generic attacks on secure outsourced databases

G Kellaris, G Kollios, K Nissim, A O'neill - Proceedings of the 2016 ACM …, 2016 - dl.acm.org
Recently, various protocols have been proposed for securely outsourcing database storage
to a third party server, ranging from systems with" full-fledged" security based on strong …

Practical non-interactive searchable encryption with forward and backward privacy

SF Sun, R Steinfeld, S Lai, X Yuan… - Usenix Network and …, 2021 - research.monash.edu
Abstract In Dynamic Symmetric Searchable Encryption (DSSE), forward privacy ensures that
previous search queries cannot be associated with future updates, while backward privacy …

Revisiting leakage abuse attacks

L Blackstone, S Kamara, T Moataz - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Encrypted search algorithms (ESA) are cryptographic algorithms that support search over
encrypted data. ESAs can be designed with various primitives including …

Mitigating leakage in secure cloud-hosted data structures: Volume-hiding for multi-maps via hashing

S Patel, G Persiano, K Yeo, M Yung - Proceedings of the 2019 ACM …, 2019 - dl.acm.org
Volume leakage has recently been identified as a major threat to the security of
cryptographic cloud-based data structures by Kellaris\em et al. CCS'16 (see also the attacks …

Conclave: secure multi-party computation on big data

N Volgushev, M Schwarzkopf, B Getchell… - Proceedings of the …, 2019 - dl.acm.org
Secure Multi-Party Computation (MPC) allows mutually distrusting parties to run joint
computations without revealing private data. Current MPC algorithms scale poorly with data …

Dynamic searchable encryption with small client storage

I Demertzis, JG Chamani, D Papadopoulos… - Cryptology ePrint …, 2019 - eprint.iacr.org
We study the problem of dynamic searchable encryption (DSE) with forward-and-backward
privacy. Many DSE schemes have been proposed recently but the most efficient ones have …

Computationally volume-hiding structured encryption

S Kamara, T Moataz - Advances in Cryptology–EUROCRYPT 2019: 38th …, 2019 - Springer
We initiate the study of structured encryption schemes with computationally-secure leakage.
Specifically, we focus on the design of volume-hiding encrypted multi-maps; that is, of …