Precision health data: Requirements, challenges and existing techniques for data security and privacy
Precision health leverages information from various sources, including omics, lifestyle,
environment, social media, medical records, and medical insurance claims to enable …
environment, social media, medical records, and medical insurance claims to enable …
Privacy by design in big data: an overview of privacy enhancing technologies in the era of big data analytics
G D'Acquisto, J Domingo-Ferrer, P Kikiras… - arXiv preprint arXiv …, 2015 - arxiv.org
The extensive collection and processing of personal information in big data analytics has
given rise to serious privacy concerns, related to wide scale electronic surveillance, profiling …
given rise to serious privacy concerns, related to wide scale electronic surveillance, profiling …
Path ORAM: an extremely simple oblivious RAM protocol
We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …
Oblix: An efficient oblivious search index
Search indices are fundamental building blocks of many systems, and there is great interest
in running them on encrypted data. Unfortunately, many known schemes that enable search …
in running them on encrypted data. Unfortunately, many known schemes that enable search …
Circuit oram: On tightness of the goldreich-ostrovsky lower bound
We propose a new tree-based ORAM scheme called Circuit ORAM. Circuit ORAM makes
both theoretical and practical contributions. From a theoretical perspective, Circuit ORAM …
both theoretical and practical contributions. From a theoretical perspective, Circuit ORAM …
Blind seer: A scalable private DBMS
V Pappas, F Krell, B Vo, V Kolesnikov… - … IEEE Symposium on …, 2014 - ieeexplore.ieee.org
Query privacy in secure DBMS is an important feature, although rarely formally considered
outside the theoretical community. Because of the high overheads of guaranteeing privacy …
outside the theoretical community. Because of the high overheads of guaranteeing privacy …
TWORAM: efficient oblivious RAM in two rounds with applications to searchable encryption
We present TWORAM, an asymptotically efficient oblivious RAM (ORAM) protocol providing
oblivious access (read and write) of a memory index y in exactly two rounds: The client …
oblivious access (read and write) of a memory index y in exactly two rounds: The client …
Oblivious data structures
We design novel, asymptotically more efficient data structures and algorithms for programs
whose data access patterns exhibit some degree of predictability. To this end, we propose …
whose data access patterns exhibit some degree of predictability. To this end, we propose …
Constants count: Practical improvements to oblivious {RAM}
Oblivious RAM (ORAM) is a cryptographic primitive that hides memory access patterns as
seen by untrusted storage. This paper proposes Ring ORAM, the most bandwidth-efficient …
seen by untrusted storage. This paper proposes Ring ORAM, the most bandwidth-efficient …
OptORAMa: optimal oblivious RAM
Oblivious RAM (ORAM), first introduced in the ground-breaking work of Goldreich and
Ostrovsky (STOC'87 and J. ACM'96) is a technique for provably obfuscating programs' …
Ostrovsky (STOC'87 and J. ACM'96) is a technique for provably obfuscating programs' …