A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Fundamental limits on communication for oblivious updates in storage networks
2014
2014 IEEE Global Communications Conference
We investigate the fundamental limits on the amount of communication necessary for such an "oblivious" update process. ...
In distributed storage systems, storage nodes intermittently go offline for numerous reasons. ...
In this paper, we seek to establish the fundamental limits on the amount of communication required to perform oblivious updates. ...
doi:10.1109/glocom.2014.7037161
dblp:conf/globecom/NakkiranSR14
fatcat:gv73fem2mzcfnmtnknjkikwcf4
HORAM: Hybrid Oblivious Random Access Memory Scheme for Secure Path Hiding in Distributed Environment
2021
International Journal of Advanced Computer Science and Applications
Belghith, "Radix Path: A Reduced Bucket Size memory primitives from Intel SGX”, Symposium on Network and
ORAM for Secure Cloud Storage," in IEEE Access, vol. 7, pp. 84907- ...
Song, “PHANTOM: Practical Oblivious
oblivious file system for intel sgx”, 25th Annual Network and Computation in a Secure Processor”, In Proceedings of the 2013 ACM
Distributed ...
doi:10.14569/ijacsa.2021.0121162
fatcat:solh26mwynf3jlmba2vy3cnspq
Securing Smart Home Edge Devices against Compromised Cloud Servers
[article]
2020
arXiv
pre-print
This paper presents FIDELIUS: a runtime system for secure cloud-based storage and communication even in the presence of compromised servers. ...
Smart home IoT systems often rely on cloud-based servers for communication between components. ...
However, most oblivious RAM techniques incur extra overheads (e.g., latency or bandwidth) for accesses to storage due to a fundamental limitation as a result of the assumption that clients only have a ...
arXiv:2006.11657v2
fatcat:p2xb5u3h4jbz3khnb6zwtevc3m
Network-Aware Overlays with Network Coordinates
2006
26th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW'06)
Network coordinates, which embed network distance measurements in a coordinate system, were introduced as a method for determining the proximity of nodes for routing table updates in overlay networks. ...
Their power has far broader reach: due to their low overhead and automatic adaptation to changes in the network, network coordinates provide a new paradigm for managing dynamic overlay networks. ...
Load balancing was an initial motivation for the network-oblivious design of storage-focused DHTs. NCs enable several new techniques for load balancing and replication. ...
doi:10.1109/icdcsw.2006.76
dblp:conf/icdcsw/PietzuchLMS06
fatcat:3zagvtq4p5hplade3ofsj5jgia
PrivateFS
2012
Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12
Privatefs is based on a new parallel Oblivious RAM mechanism (PD-ORAM)-instead of waiting for the completion of all ongoing client-server transactions, client threads can now engage a server in parallel ...
Privatefs is an oblivious file system that enables access to remote storage, while keeping both the file contents and client access patterns secret. ...
On wide-area networks, with mid to high latency, this imposes strict limits on the query response times as well as throughput. ...
doi:10.1145/2382196.2382299
dblp:conf/ccs/WilliamsST12
fatcat:zlz2cnu4hjazba4lkq5blkh2te
Query processing in multilevel secure distributed databases
2014
2014 IEEE International Advance Computing Conference (IACC)
for general query workloads on a DBMS engine with multiple access methods. ...
In this paper, we introduce ObliDB, an oblivious database engine design that is the first system to provide obliviousness for general database read workloads over multiple access methods. ...
Acknowledgments We would like to thank Ankur Dave and Wenting Zheng for their assistance in reproducing the Opaque benchmarks, as well as Henry Corrigan-Gibbs for many helpful conversations. ...
doi:10.1109/iadcc.2014.6779373
fatcat:w3hlim3rezgr7k4cfgqfibbmei
ObliDB: Oblivious Query Processing for Secure Databases
[article]
2019
arXiv
pre-print
for general query workloads on a DBMS engine with multiple access methods. ...
In this paper, we introduce ObliDB, an oblivious database engine design that is the first system to provide obliviousness for general database read workloads over multiple access methods. ...
Acknowledgments We would like to thank Ankur Dave and Wenting Zheng for their assistance in reproducing the Opaque benchmarks, as well as Henry Corrigan-Gibbs for many helpful conversations. ...
arXiv:1710.00458v6
fatcat:da3l3u2safakzmx3oscjhiru5a
Oblivious Parallel RAM: Improved Efficiency and Generic Constructions
[chapter]
2015
Lecture Notes in Computer Science
We stress that our approach is substantially different than that of BCP: One key idea is the use of partitioning, i.e., the fact that each client is responsible for a designated portion of the server storage ...
However, this additional inter-client communication must also remain oblivious. ...
We assume that OD i is implemented from some ORAM scheme O i which has communication overhead α(N ) when using address space N , and that the same scheme stores M (N ) blocks on the server for the same ...
doi:10.1007/978-3-662-49099-0_8
fatcat:5xasyzvp5rhdnjwnaqgagrlj6i
Latency-Oblivious Distributed Task Scheduling for Mobile Edge Computing
2018
2018 IEEE Global Communications Conference (GLOBECOM)
Unlike most of the existing works, we consider the latency-oblivious property of different services in order to achieve the optimized goodput and service latency. ...
Mobile Edge Computing (MEC) is emerging as one of the effective platforms for offloading the resource-and latency-constrained computational services of modern mobile applications. ...
However, the mobile devices have very limited capacity in terms of processing power, storage and battery life. ...
doi:10.1109/glocom.2018.8647673
dblp:conf/globecom/SamantaCH18
fatcat:aeb4c7wzljdslb5pv7x54zoicq
A Critical Review of the Routing Protocols in Opportunistic Networks
2014
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems
Context-oblivious routing blindly floods the network with the message copies, making it available for all the nodes in the network. ...
The role of OppNets is very crucial in today's communication as it is still not possible to build a communication infrastructure in some geographical areas including mountains, oceans and other remote ...
Acknowledgment The work reported in this paper has been supported by ...
doi:10.4108/inis.1.1.e6
fatcat:udqa63b3pzc7tedf4xu6j3rtpq
Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness
[chapter]
2015
Lecture Notes in Computer Science
We present new constructions for obliviously simulating general or parallel programs in the Network RAM model. ...
We describe applications of our new model in secure processor design and in distributed storage applications with a network adversary. ...
Trusted storage servers have also been built in the systems community [3] . ...
doi:10.1007/978-3-662-48797-6_15
fatcat:zxmytox75rfzrkobd5errdzzne
A new switch chip for IBM RS/6000 SP systems
1999
Proceedings of the 1999 ACM/IEEE conference on Supercomputing (CDROM) - Supercomputing '99
It also offers support for collective communication via a powerful hardware multicast replication capability. ...
Finally, Switch3 offers a number of other significant enhancements including limited support for high-priority traffic and detailed performance monitoring information. ...
A fundamental operation in many forms of collective communication is multicast, which is a message sent from one source node to multiple destination nodes. ...
doi:10.1145/331532.331548
dblp:conf/sc/StunkelHAS99
fatcat:uybr67ed4jgj5kcd7s56rtj5lq
I-CAN: Information-centric future mobile and wireless access networks
2014
10th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
I-CAN seeks to radically advance the integration of cellular and wireless access technologies by developing and evaluating architectures and procedures for future access networks based on Information-Centric ...
Networking (ICN). ...
MobilityFirst [6] which uses flat names and addresses for supporting mobility, actual progress on applying ICN to mobile access networks remains quite limited. ...
doi:10.1109/qshine.2014.6928676
dblp:conf/qshine/PolyzosSXMT14
fatcat:btvo2lci6rfvbnert6h6tddoxi
The New Hardware Development Trend and the Challenges in Data Management and Analysis
2018
Data Science and Engineering
In this paper, we first introduce the development trend of the new hardware in computation, storage, and network dimensions. ...
abundant heterogeneous parallelism, nonvolatile memory with hybrid storage hierarchies, and RDMA-enabled high-speed network. ...
Acknowledgements The authors would like to thank Mike Dixon for ...
doi:10.1007/s41019-018-0072-6
fatcat:kksuldstdvdohpkleq7suyq2ry
Seamless Migration of Virtual Machines across Networks
2013
2013 22nd International Conference on Computer Communication and Networks (ICCCN)
Thus, migrating VMs beyond subnets becomes a significant challenge for the purposes of load balancing, moving computation close to data sources, or connectivity recovery during natural disasters. ...
Current technologies that support live migration require that the virtual machine (VM) retain its IP network address. ...
ACKNOWLEDGEMENTS This research was funded in part by Virginia Tech and Juniper Networks. ...
doi:10.1109/icccn.2013.6614190
dblp:conf/icccn/KalimGBF13
fatcat:q52v7kykjra6nhiym7a5epcaua
« Previous
Showing results 1 — 15 out of 2,632 results