Path ORAM: an extremely simple oblivious RAM protocol

E Stefanov, M Dijk, E Shi, THH Chan… - Journal of the ACM …, 2018 - dl.acm.org
We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …

Cloud computing security: foundations and research directions

A Chakraborti, R Curtmola, J Katz… - … and Trends® in …, 2022 - nowpublishers.com
Cloud services have revolutionized modern computing. The benefits of outsourcing data and
computation come with security and privacy concerns. This monograph explores the …

OptORAMa: optimal oblivious RAM

G Asharov, I Komargodski, WK Lin, K Nayak… - Advances in Cryptology …, 2020 - Springer
Oblivious RAM (ORAM), first introduced in the ground-breaking work of Goldreich and
Ostrovsky (STOC'87 and J. ACM'96) is a technique for provably obfuscating programs' …

[PDF][PDF] 大数据计算环境下的隐私保护技术研究进展

钱文君, 沈晴霓, 吴鹏飞, 董春涛, 吴中海 - 计算机学报, 2022 - 159.226.43.17
摘要批处理, 流式计算和机器学习等分布式的大数据计算环境在云上的广泛部署与应用,
为云用户带来了极大的便利, 但随之带来的隐私数据泄露事件愈演愈烈. 如何在这种云上部署的 …

Oblidb: Oblivious query processing for secure databases

S Eskandarian, M Zaharia - arXiv preprint arXiv:1710.00458, 2017 - arxiv.org
Hardware enclaves such as Intel SGX are a promising technology for improving the security
of databases outsourced to the cloud. These enclaves provide an execution environment …

Pancake: Frequency smoothing for encrypted data stores

P Grubbs, A Khandelwal, MS Lacharité… - 29th USENIX Security …, 2020 - usenix.org
We present PANCAKE, the first system to protect key-value stores from access pattern
leakage attacks with small constant factor bandwidth overhead. PANCAKE uses a new …

Snoopy: Surpassing the scalability bottleneck of oblivious storage

E Dauterman, V Fang, I Demertzis, N Crooks… - Proceedings of the …, 2021 - dl.acm.org
Existing oblivious storage systems provide strong security by hiding access patterns, but do
not scale to sustain high throughput as they rely on a central point of coordination. To …

Taostore: Overcoming asynchronicity in oblivious data storage

C Sahin, V Zakhary, A El Abbadi, H Lin… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
We consider oblivious storage systems hiding both the contents of the data as well as
access patterns from an untrusted cloud provider. We target a scenario where multiple users …

Revisiting square-root ORAM: efficient random access in multi-party computation

S Zahur, X Wang, M Raykova, A Gascón… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
Hiding memory access patterns is required for secure computation, but remains prohibitively
expensive for many interesting applications. Prior work has either developed custom …

Obladi: Oblivious serializable transactions in the cloud

N Crooks, M Burke, E Cecchetti, S Harel… - … USENIX Symposium on …, 2018 - usenix.org
This paper presents the design and implementation of Obladi, the first system to provide
ACID transactions while also hiding access patterns. Obladi uses as its building block …