Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges
J Domingo-Ferrer, O Farras, J Ribes-González… - Computer …, 2019 - Elsevier
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …
makes it increasingly necessary to use the cloud not just to store the data, but also to …
Secure searchable encryption: a survey
Cloud computing facilitates convenient and on-demand network access to a centralized pool
of resources. Currently, many users prefer to outsource data to the cloud in order to mitigate …
of resources. Currently, many users prefer to outsource data to the cloud in order to mitigate …
New constructions for forward and backward private symmetric searchable encryption
J Ghareh Chamani, D Papadopoulos… - Proceedings of the …, 2018 - dl.acm.org
We study the problem of dynamic symmetric searchable encryption. In that setting, it is
crucial to minimize the information revealed to the server as a result of update operations …
crucial to minimize the information revealed to the server as a result of update operations …
Generic attacks on secure outsourced databases
Recently, various protocols have been proposed for securely outsourcing database storage
to a third party server, ranging from systems with" full-fledged" security based on strong …
to a third party server, ranging from systems with" full-fledged" security based on strong …
Practical non-interactive searchable encryption with forward and backward privacy
Abstract In Dynamic Symmetric Searchable Encryption (DSSE), forward privacy ensures that
previous search queries cannot be associated with future updates, while backward privacy …
previous search queries cannot be associated with future updates, while backward privacy …
Revisiting leakage abuse attacks
Encrypted search algorithms (ESA) are cryptographic algorithms that support search over
encrypted data. ESAs can be designed with various primitives including …
encrypted data. ESAs can be designed with various primitives including …
Mitigating leakage in secure cloud-hosted data structures: Volume-hiding for multi-maps via hashing
Volume leakage has recently been identified as a major threat to the security of
cryptographic cloud-based data structures by Kellaris\em et al. CCS'16 (see also the attacks …
cryptographic cloud-based data structures by Kellaris\em et al. CCS'16 (see also the attacks …
Conclave: secure multi-party computation on big data
N Volgushev, M Schwarzkopf, B Getchell… - Proceedings of the …, 2019 - dl.acm.org
Secure Multi-Party Computation (MPC) allows mutually distrusting parties to run joint
computations without revealing private data. Current MPC algorithms scale poorly with data …
computations without revealing private data. Current MPC algorithms scale poorly with data …
Dynamic searchable encryption with small client storage
We study the problem of dynamic searchable encryption (DSE) with forward-and-backward
privacy. Many DSE schemes have been proposed recently but the most efficient ones have …
privacy. Many DSE schemes have been proposed recently but the most efficient ones have …
Computationally volume-hiding structured encryption
We initiate the study of structured encryption schemes with computationally-secure leakage.
Specifically, we focus on the design of volume-hiding encrypted multi-maps; that is, of …
Specifically, we focus on the design of volume-hiding encrypted multi-maps; that is, of …