Precision health data: Requirements, challenges and existing techniques for data security and privacy

C Thapa, S Camtepe - Computers in biology and medicine, 2021 - Elsevier
Precision health leverages information from various sources, including omics, lifestyle,
environment, social media, medical records, and medical insurance claims to enable …

Privacy by design in big data: an overview of privacy enhancing technologies in the era of big data analytics

G D'Acquisto, J Domingo-Ferrer, P Kikiras… - arXiv preprint arXiv …, 2015 - arxiv.org
The extensive collection and processing of personal information in big data analytics has
given rise to serious privacy concerns, related to wide scale electronic surveillance, profiling …

Path ORAM: an extremely simple oblivious RAM protocol

E Stefanov, M Dijk, E Shi, THH Chan… - Journal of the ACM …, 2018 - dl.acm.org
We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …

Oblix: An efficient oblivious search index

P Mishra, R Poddar, J Chen, A Chiesa… - 2018 IEEE symposium …, 2018 - ieeexplore.ieee.org
Search indices are fundamental building blocks of many systems, and there is great interest
in running them on encrypted data. Unfortunately, many known schemes that enable search …

Circuit oram: On tightness of the goldreich-ostrovsky lower bound

X Wang, H Chan, E Shi - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
We propose a new tree-based ORAM scheme called Circuit ORAM. Circuit ORAM makes
both theoretical and practical contributions. From a theoretical perspective, Circuit ORAM …

Blind seer: A scalable private DBMS

V Pappas, F Krell, B Vo, V Kolesnikov… - … IEEE Symposium on …, 2014 - ieeexplore.ieee.org
Query privacy in secure DBMS is an important feature, although rarely formally considered
outside the theoretical community. Because of the high overheads of guaranteeing privacy …

TWORAM: efficient oblivious RAM in two rounds with applications to searchable encryption

S Garg, P Mohassel, C Papamanthou - Annual International Cryptology …, 2016 - Springer
We present TWORAM, an asymptotically efficient oblivious RAM (ORAM) protocol providing
oblivious access (read and write) of a memory index y in exactly two rounds: The client …

Oblivious data structures

XS Wang, K Nayak, C Liu, THH Chan, E Shi… - Proceedings of the …, 2014 - dl.acm.org
We design novel, asymptotically more efficient data structures and algorithms for programs
whose data access patterns exhibit some degree of predictability. To this end, we propose …

Constants count: Practical improvements to oblivious {RAM}

L Ren, C Fletcher, A Kwon, E Stefanov, E Shi… - 24th USENIX Security …, 2015 - usenix.org
Oblivious RAM (ORAM) is a cryptographic primitive that hides memory access patterns as
seen by untrusted storage. This paper proposes Ring ORAM, the most bandwidth-efficient …

OptORAMa: optimal oblivious RAM

G Asharov, I Komargodski, WK Lin, K Nayak… - Advances in Cryptology …, 2020 - Springer
Oblivious RAM (ORAM), first introduced in the ground-breaking work of Goldreich and
Ostrovsky (STOC'87 and J. ACM'96) is a technique for provably obfuscating programs' …