2,632 Hits in 5.4 sec

Fundamental limits on communication for oblivious updates in storage networks

Preetum Nakkiran, Nihar B. Shah, K. V. Rashmi
2014 2014 IEEE Global Communications Conference  
We investigate the fundamental limits on the amount of communication necessary for such an "oblivious" update process.  ...  In distributed storage systems, storage nodes intermittently go offline for numerous reasons.  ...  In this paper, we seek to establish the fundamental limits on the amount of communication required to perform oblivious updates.  ... 
doi:10.1109/glocom.2014.7037161 dblp:conf/globecom/NakkiranSR14 fatcat:gv73fem2mzcfnmtnknjkikwcf4

HORAM: Hybrid Oblivious Random Access Memory Scheme for Secure Path Hiding in Distributed Environment

Snehalata Funde, Gandharba Swain
2021 International Journal of Advanced Computer Science and Applications  
Belghith, "Radix Path: A Reduced Bucket Size memory primitives from Intel SGX”, Symposium on Network and ORAM for Secure Cloud Storage," in IEEE Access, vol. 7, pp. 84907-  ...  Song, “PHANTOM: Practical Oblivious oblivious file system for intel sgx”, 25th Annual Network and Computation in a Secure Processor”, In Proceedings of the 2013 ACM Distributed  ... 
doi:10.14569/ijacsa.2021.0121162 fatcat:solh26mwynf3jlmba2vy3cnspq

Securing Smart Home Edge Devices against Compromised Cloud Servers [article]

Rahmadi Trimananda, Ali Younis, Thomas Kwa, Brian Demsky, Harry Xu
2020 arXiv   pre-print
This paper presents FIDELIUS: a runtime system for secure cloud-based storage and communication even in the presence of compromised servers.  ...  Smart home IoT systems often rely on cloud-based servers for communication between components.  ...  However, most oblivious RAM techniques incur extra overheads (e.g., latency or bandwidth) for accesses to storage due to a fundamental limitation as a result of the assumption that clients only have a  ... 
arXiv:2006.11657v2 fatcat:p2xb5u3h4jbz3khnb6zwtevc3m

Network-Aware Overlays with Network Coordinates

P. Pietzuch, J. Ledlie, M. Mitzenmacher, M. Seltzer
2006 26th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW'06)  
Network coordinates, which embed network distance measurements in a coordinate system, were introduced as a method for determining the proximity of nodes for routing table updates in overlay networks.  ...  Their power has far broader reach: due to their low overhead and automatic adaptation to changes in the network, network coordinates provide a new paradigm for managing dynamic overlay networks.  ...  Load balancing was an initial motivation for the network-oblivious design of storage-focused DHTs. NCs enable several new techniques for load balancing and replication.  ... 
doi:10.1109/icdcsw.2006.76 dblp:conf/icdcsw/PietzuchLMS06 fatcat:3zagvtq4p5hplade3ofsj5jgia


Peter Williams, Radu Sion, Alin Tomescu
2012 Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12  
Privatefs is based on a new parallel Oblivious RAM mechanism (PD-ORAM)-instead of waiting for the completion of all ongoing client-server transactions, client threads can now engage a server in parallel  ...  Privatefs is an oblivious file system that enables access to remote storage, while keeping both the file contents and client access patterns secret.  ...  On wide-area networks, with mid to high latency, this imposes strict limits on the query response times as well as throughput.  ... 
doi:10.1145/2382196.2382299 dblp:conf/ccs/WilliamsST12 fatcat:zlz2cnu4hjazba4lkq5blkh2te

Query processing in multilevel secure distributed databases

Pooja Sapra, Suresh Kumar, Rk Rathy
2014 2014 IEEE International Advance Computing Conference (IACC)  
for general query workloads on a DBMS engine with multiple access methods.  ...  In this paper, we introduce ObliDB, an oblivious database engine design that is the first system to provide obliviousness for general database read workloads over multiple access methods.  ...  Acknowledgments We would like to thank Ankur Dave and Wenting Zheng for their assistance in reproducing the Opaque benchmarks, as well as Henry Corrigan-Gibbs for many helpful conversations.  ... 
doi:10.1109/iadcc.2014.6779373 fatcat:w3hlim3rezgr7k4cfgqfibbmei

ObliDB: Oblivious Query Processing for Secure Databases [article]

Saba Eskandarian, Matei Zaharia
2019 arXiv   pre-print
for general query workloads on a DBMS engine with multiple access methods.  ...  In this paper, we introduce ObliDB, an oblivious database engine design that is the first system to provide obliviousness for general database read workloads over multiple access methods.  ...  Acknowledgments We would like to thank Ankur Dave and Wenting Zheng for their assistance in reproducing the Opaque benchmarks, as well as Henry Corrigan-Gibbs for many helpful conversations.  ... 
arXiv:1710.00458v6 fatcat:da3l3u2safakzmx3oscjhiru5a

Oblivious Parallel RAM: Improved Efficiency and Generic Constructions [chapter]

Binyi Chen, Huijia Lin, Stefano Tessaro
2015 Lecture Notes in Computer Science  
We stress that our approach is substantially different than that of BCP: One key idea is the use of partitioning, i.e., the fact that each client is responsible for a designated portion of the server storage  ...  However, this additional inter-client communication must also remain oblivious.  ...  We assume that OD i is implemented from some ORAM scheme O i which has communication overhead α(N ) when using address space N , and that the same scheme stores M (N ) blocks on the server for the same  ... 
doi:10.1007/978-3-662-49099-0_8 fatcat:5xasyzvp5rhdnjwnaqgagrlj6i

Latency-Oblivious Distributed Task Scheduling for Mobile Edge Computing

Amit Samanta, Zheng Chang, Zhu Han
2018 2018 IEEE Global Communications Conference (GLOBECOM)  
Unlike most of the existing works, we consider the latency-oblivious property of different services in order to achieve the optimized goodput and service latency.  ...  Mobile Edge Computing (MEC) is emerging as one of the effective platforms for offloading the resource-and latency-constrained computational services of modern mobile applications.  ...  However, the mobile devices have very limited capacity in terms of processing power, storage and battery life.  ... 
doi:10.1109/glocom.2018.8647673 dblp:conf/globecom/SamantaCH18 fatcat:aeb4c7wzljdslb5pv7x54zoicq

A Critical Review of the Routing Protocols in Opportunistic Networks

John Panneerselvam, Anthony Atojoko, Kim Smith, Lu Liu, Nick Antonopoulos
2014 EAI Endorsed Transactions on Industrial Networks and Intelligent Systems  
Context-oblivious routing blindly floods the network with the message copies, making it available for all the nodes in the network.  ...  The role of OppNets is very crucial in today's communication as it is still not possible to build a communication infrastructure in some geographical areas including mountains, oceans and other remote  ...  Acknowledgment The work reported in this paper has been supported by  ... 
doi:10.4108/inis.1.1.e6 fatcat:udqa63b3pzc7tedf4xu6j3rtpq

Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness [chapter]

Dana Dachman-Soled, Chang Liu, Charalampos Papamanthou, Elaine Shi, Uzi Vishkin
2015 Lecture Notes in Computer Science  
We present new constructions for obliviously simulating general or parallel programs in the Network RAM model.  ...  We describe applications of our new model in secure processor design and in distributed storage applications with a network adversary.  ...  Trusted storage servers have also been built in the systems community [3] .  ... 
doi:10.1007/978-3-662-48797-6_15 fatcat:zxmytox75rfzrkobd5errdzzne

A new switch chip for IBM RS/6000 SP systems

Craig B. Stunkel, Jay Herring, Bulent Abali, Rajeev Sivaram
1999 Proceedings of the 1999 ACM/IEEE conference on Supercomputing (CDROM) - Supercomputing '99  
It also offers support for collective communication via a powerful hardware multicast replication capability.  ...  Finally, Switch3 offers a number of other significant enhancements including limited support for high-priority traffic and detailed performance monitoring information.  ...  A fundamental operation in many forms of collective communication is multicast, which is a message sent from one source node to multiple destination nodes.  ... 
doi:10.1145/331532.331548 dblp:conf/sc/StunkelHAS99 fatcat:uybr67ed4jgj5kcd7s56rtj5lq

I-CAN: Information-centric future mobile and wireless access networks

George C. Polyzos, Vasilios A. Siris, George Xylomenos, Giannis F. Marias, Stavros Toumpis
2014 10th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness  
I-CAN seeks to radically advance the integration of cellular and wireless access technologies by developing and evaluating architectures and procedures for future access networks based on Information-Centric  ...  Networking (ICN).  ...  MobilityFirst [6] which uses flat names and addresses for supporting mobility, actual progress on applying ICN to mobile access networks remains quite limited.  ... 
doi:10.1109/qshine.2014.6928676 dblp:conf/qshine/PolyzosSXMT14 fatcat:btvo2lci6rfvbnert6h6tddoxi

The New Hardware Development Trend and the Challenges in Data Management and Analysis

Wei Pan, Zhanhuai Li, Yansong Zhang, Chuliang Weng
2018 Data Science and Engineering  
In this paper, we first introduce the development trend of the new hardware in computation, storage, and network dimensions.  ...  abundant heterogeneous parallelism, nonvolatile memory with hybrid storage hierarchies, and RDMA-enabled high-speed network.  ...  Acknowledgements The authors would like to thank Mike Dixon for  ... 
doi:10.1007/s41019-018-0072-6 fatcat:kksuldstdvdohpkleq7suyq2ry

Seamless Migration of Virtual Machines across Networks

Umar Kalim, Mark K. Gardner, Eric J. Brown, Wu-chun Feng
2013 2013 22nd International Conference on Computer Communication and Networks (ICCCN)  
Thus, migrating VMs beyond subnets becomes a significant challenge for the purposes of load balancing, moving computation close to data sources, or connectivity recovery during natural disasters.  ...  Current technologies that support live migration require that the virtual machine (VM) retain its IP network address.  ...  ACKNOWLEDGEMENTS This research was funded in part by Virginia Tech and Juniper Networks.  ... 
doi:10.1109/icccn.2013.6614190 dblp:conf/icccn/KalimGBF13 fatcat:q52v7kykjra6nhiym7a5epcaua
« Previous Showing results 1 — 15 out of 2,632 results