Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

Ghostor: Toward a Secure {Data-Sharing} System from Decentralized Trust

Y Hu, S Kumar, RA Popa - 17th USENIX Symposium on Networked …, 2020 - usenix.org
Data-sharing systems are often used to store sensitive data. Both academia and industry
have proposed numerous solutions to protect the user privacy and data integrity from a …

SeGShare: Secure group file sharing in the cloud using enclaves

B Fuhry, L Hirschoff, S Koesnadi… - 2020 50th Annual …, 2020 - ieeexplore.ieee.org
File sharing applications using cloud storage are increasingly popular for personal and
business use. Due to data protection concerns, end-to-end encryption is often a desired …

ESMAC: Efficient and secure multi-owner access control with TEE in multi-level data processing

D Liu, Z Yan, W Ding, Y Cai, Y Chen… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Traditional data access control schemes only prevent unauthorized access to private data
with a single owner. They are not suitable for application in a Multi-Level Data Processing …

Implementation of a secure multi-cloud storage framework with next-generation cryptosystems and split-protocol

BS Rawal, G Manogaran - 2021 International Symposium on …, 2021 - ieeexplore.ieee.org
Cloud storage is a popular method of storing and sharing data. Numerous cloud service
providers offer storage as a service, while others focus on sharing as a service. Many …

Popularity-Aware Storage Systems for Big Data Applications

T Cao - 2022 - search.proquest.com
Recommendation algorithms play an increasingly dominant role in big data services like
Netflix and YouTube. In streaming applications, it becomes unavoidable that trillion tons of …

Distributed systems and trusted execution environments: Trade-offs and challenges

RP Pires - arXiv preprint arXiv:2001.09670, 2020 - arxiv.org
Security and privacy concerns in computer systems have grown in importance with the
ubiquity of connected devices. TEEs provide security guarantees based on cryptographic …

KLUSTERISASI LOG AKTIFITAS PADA SISTEM KEAMANAN FILE DENGAN PENDEKATAN DATA MINING

A Pamuji, HS Setiawan - Jurnal Teknik Informatika, 2022 - ejurnal.ulbi.ac.id
The file system is an area or resource that can be considered critical in addition to having
high sensitivity. The file system is related to user management and is monitored through the …

Secure group file sharing

B Fuhry, L Hirschoff, F Kerschbaum - US Patent 11,546,341, 2023 - Google Patents
Aspects of the current subject matter are directed to secure group file sharing. An
architecture for end-to-end encrypted, group-based file sharing using a trusted execution …

Bifrost: A Secure, Scalable and Efficient File Sharing System Based on Dual Deduplication

H Sehat, DE Lucani, E Pagnin - 2022 IEEE 11th International …, 2022 - ieeexplore.ieee.org
We consider the problem of sharing sensitive files across users while relying on a common,
untrusted third-party, eg, a Cloud Storage Provider (CSP). Although users can rely on a …