Path ORAM: an extremely simple oblivious RAM protocol
We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …
Cloud computing security: foundations and research directions
Cloud services have revolutionized modern computing. The benefits of outsourcing data and
computation come with security and privacy concerns. This monograph explores the …
computation come with security and privacy concerns. This monograph explores the …
OptORAMa: optimal oblivious RAM
Oblivious RAM (ORAM), first introduced in the ground-breaking work of Goldreich and
Ostrovsky (STOC'87 and J. ACM'96) is a technique for provably obfuscating programs' …
Ostrovsky (STOC'87 and J. ACM'96) is a technique for provably obfuscating programs' …
[PDF][PDF] 大数据计算环境下的隐私保护技术研究进展
钱文君, 沈晴霓, 吴鹏飞, 董春涛, 吴中海 - 计算机学报, 2022 - 159.226.43.17
摘要批处理, 流式计算和机器学习等分布式的大数据计算环境在云上的广泛部署与应用,
为云用户带来了极大的便利, 但随之带来的隐私数据泄露事件愈演愈烈. 如何在这种云上部署的 …
为云用户带来了极大的便利, 但随之带来的隐私数据泄露事件愈演愈烈. 如何在这种云上部署的 …
Oblidb: Oblivious query processing for secure databases
S Eskandarian, M Zaharia - arXiv preprint arXiv:1710.00458, 2017 - arxiv.org
Hardware enclaves such as Intel SGX are a promising technology for improving the security
of databases outsourced to the cloud. These enclaves provide an execution environment …
of databases outsourced to the cloud. These enclaves provide an execution environment …
Pancake: Frequency smoothing for encrypted data stores
We present PANCAKE, the first system to protect key-value stores from access pattern
leakage attacks with small constant factor bandwidth overhead. PANCAKE uses a new …
leakage attacks with small constant factor bandwidth overhead. PANCAKE uses a new …
Snoopy: Surpassing the scalability bottleneck of oblivious storage
Existing oblivious storage systems provide strong security by hiding access patterns, but do
not scale to sustain high throughput as they rely on a central point of coordination. To …
not scale to sustain high throughput as they rely on a central point of coordination. To …
Taostore: Overcoming asynchronicity in oblivious data storage
We consider oblivious storage systems hiding both the contents of the data as well as
access patterns from an untrusted cloud provider. We target a scenario where multiple users …
access patterns from an untrusted cloud provider. We target a scenario where multiple users …
Revisiting square-root ORAM: efficient random access in multi-party computation
Hiding memory access patterns is required for secure computation, but remains prohibitively
expensive for many interesting applications. Prior work has either developed custom …
expensive for many interesting applications. Prior work has either developed custom …
Obladi: Oblivious serializable transactions in the cloud
This paper presents the design and implementation of Obladi, the first system to provide
ACID transactions while also hiding access patterns. Obladi uses as its building block …
ACID transactions while also hiding access patterns. Obladi uses as its building block …