A comparison study of intel SGX and AMD memory encryption technology

S Mofrad, F Zhang, S Lu, W Shi - … of the 7th International Workshop on …, 2018 - dl.acm.org
Hardware-assisted trusted execution environments are secure isolation technologies that
have been engineered to serve as efficient defense mechanisms to provide a security …

Anonymous authentication on trust in blockchain-based mobile crowdsourcing

W Feng, Z Yan, LT Yang… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Mobile crowdsourcing (MCS) has become an effective data collection method due to its
mobility, low cost, and flexibility. However, since centralized MCS confronts severe security …

Personal database security and trusted execution environments: A tutorial at the crossroads

N Anciaux, L Bouganim, P Pucheral… - Proceedings of the …, 2019 - inria.hal.science
Smart disclosure initiatives and new regulations such as GDPR in the EU increase the
interest for Personal Data Management Systems (PDMS) being provided to individuals to …

[HTML][HTML] Secure end-to-end processing of smart metering data

A Brito, C Fetzer, S Köpsell, P Pietzuch, M Pasin… - Journal of Cloud …, 2019 - Springer
Cloud computing considerably reduces the costs of deploying applications through on-
demand, automated and fine-granular allocation of resources. Even in private settings, cloud …

Maskal: Privacy preserving masked reads alignment using intel sgx

C Lambert, M Fernandes, J Decouchant… - 2018 IEEE 37th …, 2018 - ieeexplore.ieee.org
The recent introduction of new DNA sequencing techniques caused the amount of
processed and stored biological data to skyrocket. In order to process these vast amounts of …

Privacy-preserving location-based services by using intel sgx

V Kulkarni, B Chapuis, B Garbinato - Proceedings of the First …, 2017 - dl.acm.org
We are witnessing a rapid proliferation of location-based services, due to the useful context-
aware services they provide their users. However, sharing sensitive location traces with …

TEEnder: SGX enclave migration using HSMs

J Guerreiro, R Moura, JN Silva - Computers & Security, 2020 - Elsevier
Abstract Intel Software Guard Extensions (SGX) is a new method of enhancing application
security by creating safe areas of memory (enclaves) where data and code are protected …

[PDF][PDF] Achieving trustworthy Homomorphic Encryption by combining it with a Trusted Execution Environment.

N Drucker, S Gueron - J. Wirel. Mob. Networks Ubiquitous Comput …, 2018 - isyou.info
Cloud database services become very appealing solutions. They offer performance and
storage capabilities that client platforms do not have. However, in order to protect the users' …

Securing big data scientific workflows via trusted heterogeneous environments

S Mofrad, I Ahmed, F Zhang, S Lu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Big data workflow management systems (BDWMS) s have recently emerged as popular data
analytics platforms to conduct large-scale data analytics in the cloud. However, the …

[PDF][PDF] 大数据安全技术研究进展

陈性元, 高元照, 唐慧林, 杜学绘 - 中国科学: 信息科学, 2020 - scis.scichina.com
摘要大数据是经济发展的新动能, 社会发展的新引擎, 塑造国家竞争力的战略制高点,
对人民生活具有重大影响. 然而随着社会对数据价值认知的提升和大数据平台建设的蓬勃发展 …