Filters








218 Hits in 4.9 sec

Analysis of Heuristic Based Access Pattern Obfuscation

Huseyin Ulusoy, Murat Kantarcioglu, Bhavani Thuraisingham, Ebru Cankaya, Erman Pattuk
2013 Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing  
., they disclose which data items are retrieved based on the query execution).  ...  However, the overhead of oblivious RAM based solutions is too high in many cases, and the security and scalability of heuristic based techniques have not been carefully analyzed yet.  ...  to be cost efficient for cloud environment [3] .  ... 
doi:10.4108/icst.collaboratecom.2013.254199 dblp:conf/colcom/UlusoyKTCP13 fatcat:z4lwltmxt5e6xlw7mq7rpibtf4

A Secured Public Auditing Protocol with Dynamic Structure for Cloud Data

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
At present Cloud computing is a very successful paradigm for data computing and storage. It Increases the concerns about data security and privacy in the cloud.  ...  Paper covers cloud security and privacy research, while focusing on the works that protect data confidentiality and privacy for sensitive data being stored and queried in the cloud.  ...  executed in remote.  ... 
doi:10.35940/ijitee.a1019.1191s19 fatcat:lxdc7ufngbhj5hlga23wrbttzm

Obfuscating the Topical Intention in Enterprise Text Search

Hwee Hwa Pang, Xiaokui Xiao, Jialie Shen
2012 2012 IEEE 28th International Conference on Data Engineering  
In this paper, we advocate a unique approach to profile the topics that are relevant to the user intention.  ...  To safeguard the enterprise from consequences arising from a disclosure of the query traces, it is desirable to obfuscate the true user intention from the search engine, without requiring it to be re-engineered  ...  ACKNOWLEDGEMENT We thank the reviewers for their constructive feedback. HweeHwa Pang is supported by Research Grant 10-C220-SMU-003 from the Singapore Management University.  ... 
doi:10.1109/icde.2012.43 dblp:conf/icde/PangXS12 fatcat:mhi3sbjssbcfhf7lwicw35lq74

A Survey on RISC-V Security: Hardware and Architecture [article]

Tao Lu
2021 arXiv   pre-print
In order to deal with foreseeable security threats, the RISC-V community is studying security solutions aimed at achieving a root of trust (RoT) and ensuring that sensitive information on RISC-V devices  ...  For decades, these processors were mainly based on the Arm instruction set architecture (ISA).  ...  Trusted user mode (TU-mode) can be leveraged for isolated execution environments, called enclaves.  ... 
arXiv:2107.04175v1 fatcat:hr6avyprj5dvpav2pvnmfmvg2a

SoK of Used Cryptography in Blockchain [article]

Mayank Raikwar, Danilo Gligoroski, Katina Kralevska
2019 arXiv   pre-print
in blockchain.  ...  Additionally, we give a list of cryptographic concepts which have not yet been applied but have big potentials to improve the current blockchain solutions.  ...  In some manner, consensus orchestrates the state of the programs executed in the blockchain network nodes by providing a runtime environment to collectively verify the same program and hence reach to a  ... 
arXiv:1906.08609v3 fatcat:l62esrum3bhmfcdxzpx3h3he4e

A Large Scale Analysis of Android-Web Hybridization [article]

Abhishek Tiwari, Jyoti Prakash, Sascha Gross, Christian Hammer
2020 arXiv   pre-print
Many Android applications embed webpages via WebView components and execute JavaScript code within Android. Hybrid applications leverage dedicated APIs to load a resource and render it in a WebView.  ...  Additionally, we discovered a multitude of applications in which potentially untrusted JavaScript code may interfere with (trusted) Android objects, both in benign and malign applications.  ...  can interfere with the trusted Android environment.  ... 
arXiv:2008.01725v2 fatcat:6o2aldwcm5fh7o7o2ch6q7rwmu

Access-Private Outsourcing of Markov Chain and RandomWalk based Data Analysis Applications

Ping Lin, K.S. Candan
2006 22nd International Conference on Data Engineering Workshops (ICDEW'06)  
Hence as opposed to simple obfuscation mechanisms, we develop an algorithm based on methodical addition of extra states, which guarantees unbounded feasible regions for the inputs, thus preventing a malicious  ...  In this paper, we focus on access-privacy enabled outsourced Markov chain based data analysis applications, where a non-trusted service provider takes (hidden) user queries that are described in terms  ...  Rida Bazzi and Zhichao Liu for their participation in the discussion of the work.  ... 
doi:10.1109/icdew.2006.25 dblp:conf/icde/LinC06a fatcat:wnwaouu3mbeqhopzsshha7yjxe

Enabling access-privacy for random walk based data analysis applications

Ping Lin, K. Selçuk Candan
2007 Data & Knowledge Engineering  
In this paper, we focus on access-privacy enabled outsourced Markov chain based data analysis applications, where a non-trusted service provider takes (hidden) user queries that are described in terms  ...  Hence as opposed to simple obfuscation mechanisms, we develop an algorithm based on methodical addition of extra states, which guarantees unbounded feasible regions for the inputs, thus preventing a malicious  ...  the queries in an oblivious manner.  ... 
doi:10.1016/j.datak.2007.03.011 fatcat:lamxyvpvpnbt5dtfh2jxi3vy2i

A practical privacy-preserving targeted advertising scheme for IPTV users

Leyli Javid Khayati, Cengiz Orencik, Erkay Savas, Berkant Ustaoglu
2015 International Journal of Information Security  
In this work, we present a privacy-preserving scheme for targeted advertising via the Internet Protocol TV (IPTV).  ...  The latter includes watching history, preferences for IPTV content and watching rate, which are periodically (e.g., weekly) published on a semi-trusted server (e.g., cloud server) along with anonymized  ...  [16] proposed an efficient scheme for conjunctive keyword-based search. In their solution, a searchable index is generated for each document that represents the keywords in those documents.  ... 
doi:10.1007/s10207-015-0296-7 fatcat:hhkjlvf7vzhhplclak4vpj2xyu

An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices

Federica Paci, Elisa Bertino, Sam Kerr, Anna Squicciarini, Jungha Woo
2009 Journal of Software  
environment and executes code, which means it can be 3) Verification of aggregate signature. After the veri- used for more complex applications.  ...  context of mobile environments is further complicated Index Terms— digital identity management, identity at- by the fact that mobile devices are not secure.  ... 
doi:10.4304/jsw.4.7.696-706 fatcat:wqg56sakhrbjlfq7afbphzsicu

GhostRider

Chang Liu, Austin Harris, Martin Maas, Michael Hicks, Mohit Tiwari, Elaine Shi
2015 SIGPLAN notices  
This paper presents a new, co-designed compiler and architecture called GhostRider for supporting privacy preserving computation in the cloud.  ...  GhostRider ensures all programs satisfy a property called memory-trace obliviousness (MTO): Even an adversary that observes memory, bus traffic, and access times while the program executes can learn nothing  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the US Army Research Laboratory  ... 
doi:10.1145/2775054.2694385 fatcat:zj6ukiorybaohajnsooue3ie7u

A Hybrid Approach to Secure Function Evaluation Using SGX [article]

Joseph I. Choi, Dave 'Jing' Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler, Patrick Traynor
2019 arXiv   pre-print
Intel's Software Guard Extensions (SGX) provides hardware-protected execution environments, called enclaves, that may be viewed as trusted computation oracles.  ...  In a sense, such a protocol realizes a trusted oracle that computes f and returns the result to both parties.  ...  ACKNOWLEDGMENTS This work is supported in part by the US National Science Foundation under grant numbers CNS-1540217, CNS-1564444, and CNS-1642973.  ... 
arXiv:1905.01233v1 fatcat:jsq22qmoj5bzraynun6fibq43y

Separation of Powers in Federated Learning [article]

Pau-Chen Cheng, Kevin Eykholt, Zhongshu Gu, Hani Jamjoom, K. R. Jayaram, Enriquillo Valdez, Ashish Verma
2021 arXiv   pre-print
Thus, each aggregator only has a fragmentary and shuffled view of model updates and is oblivious to the model architecture.  ...  for multiple TEE-protected aggregators.  ...  (III) Trusted Execution Environments (TEEs) can help establish confidential and remote-attestable execution entities on untrustworthy servers.  ... 
arXiv:2105.09400v1 fatcat:ewbxs33eijfx5fsbmnsi62odl4

Privacy-preserving event detection in pervasive spaces

Bijit Hore, Jehan Wickramasuriya, Sharad Mehrotra, Nalini Venkatasubramanian, Daniel Massaguer
2009 2009 IEEE International Conference on Pervasive Computing and Communications  
In this paper, we consider privacy challenges in event-driven pervasive spaces where multimedia streams captured by sensors embedded in the infrastructure are used to detect a variety of application-specific  ...  In particular, we develop techniques to detect events without disclosing any identifying information unless necessary.  ...  The authors in [20] approach the problem in a similar manner, where the goal is to prevent the adversary from knowing whether a document matches the search criteria or not by obfuscating the pattern  ... 
doi:10.1109/percom.2009.4912772 dblp:conf/percom/HoreWMVM09 fatcat:fq4hwshenrd6dfr3njdpvlmo44

PHANTOM

Martin Maas, Eric Love, Emil Stefanov, Mohit Tiwari, Elaine Shi, Krste Asanovic, John Kubiatowicz, Dawn Song
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently  ...  Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining  ...  document).  ... 
doi:10.1145/2508859.2516692 dblp:conf/ccs/MaasLSTSAKS13 fatcat:q2y4y6qas5fobe5nb47xla42be
« Previous Showing results 1 — 15 out of 218 results