Filters








109 Hits in 2.9 sec

Query processing in multilevel secure distributed databases

Pooja Sapra, Suresh Kumar, Rk Rathy
2014 2014 IEEE International Advance Computing Conference (IACC)  
We implement ObliDB and show that, on analytics workloads, ObliDB ranges from 1.1-19× faster than Opaque, a previous oblivious, enclave-based system designed only for analytics, and comes within 2.6× of  ...  These enclaves provide an execution environment isolated from the hypervisor/OS, and encrypt data in RAM.  ...  Acknowledgments We would like to thank Ankur Dave and Wenting Zheng for their assistance in reproducing the Opaque benchmarks, as well as Henry Corrigan-Gibbs for many helpful conversations.  ... 
doi:10.1109/iadcc.2014.6779373 fatcat:w3hlim3rezgr7k4cfgqfibbmei

ObliDB: Oblivious Query Processing for Secure Databases [article]

Saba Eskandarian, Matei Zaharia
2019 arXiv   pre-print
We implement ObliDB and show that, on analytics work-loads, ObliDB ranges from 1.1-19x faster than Opaque,a previous oblivious, enclave-based system designed only for analytics, and comes within 2.6x of  ...  These enclaves provide an execution environment isolated from the hypervisor/OS, and encrypt data in RAM.  ...  Acknowledgments We would like to thank Ankur Dave and Wenting Zheng for their assistance in reproducing the Opaque benchmarks, as well as Henry Corrigan-Gibbs for many helpful conversations.  ... 
arXiv:1710.00458v6 fatcat:da3l3u2safakzmx3oscjhiru5a

StreamBox-TZ: Secure Stream Analytics at the Edge with TrustZone [article]

Heejin Park, Shuang Zhai, Long Lu, Felix Xiaozhu Lin
2019 arXiv   pre-print
In response, we present StreamBox-TZ (SBT), a stream analytics engine for an edge platform that offers strong data security, verifiable results, and good performance.  ...  On an octa core ARMv8 platform, it delivers the state-of-the-art performance by processing input events up to 140 MB/sec (12M events/sec) with sub-second delay.  ...  Third, a few systems, notably VC3 [89] and Opaque [109] , use TEE to protect data operators of distributed analytics.  ... 
arXiv:1808.05078v2 fatcat:vnw7bj746fa4fnde2tavt7vtye

Prochlo

Andrea Bittau, Bernhard Seefeld, Úlfar Erlingsson, Petros Maniatis, Ilya Mironov, Ananth Raghunathan, David Lie, Mitch Rudominer, Ushasree Kode, Julien Tinnes
2017 Proceedings of the 26th Symposium on Operating Systems Principles - SOSP '17  
The ESA design, and its Prochlo implementation, are informed by our practical experiences with an existing, large deployment of privacy-preserving software monitoring. (cont.; see the paper)  ...  We thank the anonymous reviewers for their detailed feedback, and Martín Abadi, Johannes Gehrke, Lea Kissner, Noé Lutz, and Nicolas Papernot for their valuable advice on earlier drafts.  ...  Opaque uses SGX-based ColumnSort for private-data analytics [78] .  ... 
doi:10.1145/3132747.3132769 dblp:conf/sosp/BittauEMMRLRKTS17 fatcat:s5icmqnn6jgznjqhh4fo4fzahm

SGX-MR: Regulating Dataflows for Protecting Access Patterns of Data-Intensive SGX Applications [article]

A K M Mubashwir Alam, Sagar Sharma, Keke Chen
2020 arXiv   pre-print
Intel SGX has been a popular trusted execution environment (TEE) for protecting the integrity and confidentiality of applications running on untrusted platforms such as cloud.  ...  Researchers have been experimenting with Oblivious RAM (ORAM) to address the privacy of access patterns.  ...  Opaque [36] tries to revise Spark for SGX.  ... 
arXiv:2009.03518v1 fatcat:zfa64wp5brhmvpvrmmk7c7vlka

SGX-MR: Regulating Dataflows for Protecting Access Patterns of Data-Intensive SGX Applications

A K M Mubashwir Alam, Sagar Sharma, Keke Chen
2021 Proceedings on Privacy Enhancing Technologies  
AbstractIntel SGX has been a popular trusted execution environment (TEE) for protecting the integrity and confidentiality of applications running on untrusted platforms such as cloud.  ...  Researchers have been experimenting with Oblivious RAM (ORAM) to address the privacy of access patterns.  ...  Acknowledgement We thank our shepherd Claudio Soriente and all the anonymous reviewers for their guidance and insightful comments on improving this paper.  ... 
doi:10.2478/popets-2021-0002 fatcat:6chbzxlpobeytaysxwe353cyom

SecGrid: A Secure and Efficient SGX-enabled Smart Grid System with Rich Functionalities [article]

Shaohua Li, Kaiping Xue
2018 arXiv   pre-print
Existing solutions in smart grid usually use cryptographic tools, such as homomorphic encryption, to protect individual privacy, which, however, can only support limited and simple functionalities.  ...  Smart grid adopts two-way communication and rich functionalities to gain a positive impact on the sustainability and efficiency of power usage, but on the other hand, also poses serious challenges to customers  ...  Opaque [33] is an encrypted data analytics platform over Spark SQL, which uses oblivious sorting for data processing in an encrypted database.  ... 
arXiv:1810.01651v1 fatcat:nei3o6c2ejc6ngd5u7x2lyfwva

Strongly Secure and Efficient Data Shuffle On Hardware Enclaves [article]

Ju Chen, Yuzhe Tang, Hao Zhou
2017 arXiv   pre-print
Mitigating memory-access attacks on the Intel SGX architecture is an important and open research problem.  ...  A natural notion of the mitigation is cache-miss obliviousness which requires the cache-misses emitted during an enclave execution are oblivious to sensitive data.  ...  Various data-analytical systems are developed based on the computation-specific oblivious algorithms, such as Opaque [29] for relational data analytics and oblivious machine learning [24] . ese systems  ... 
arXiv:1711.04243v1 fatcat:duvcrbso3jf2lpfkobbuc7ybdm

A demonstration of sterling

Nick Hynes, David Dao, David Yan, Raymond Cheng, Dawn Song
2018 Proceedings of the VLDB Endowment  
Acknowledgements We would like to thank Ce Zhang, Dan Alistarh, and Claudiu Musat for their helpful feedback and discussion.  ...  Upon this generic platform, we build a market for privacy-preserving machine learning data and models.  ...  There have been several attempts at creating distributed AI and data marketplaces for public datasets, some of which are implemented as smart contracts on distributed ledgers known as blockchains.  ... 
doi:10.14778/3229863.3236266 fatcat:t6rjy7ta7faanekrgvg44s6ejy

StealthDB: a Scalable Encrypted Database with Full SQL Query Support

Dhinakaran Vinayagamurthy, Alexey Gribov, Sergey Gorbunov
2019 Proceedings on Privacy Enhancing Technologies  
In this work we build StealthDB – an encrypted database system from Intel SGX. Our system can run on any newer generation Intel CPU.  ...  On the other hand, some encrypted database systems (e.g., Cipherbase, TrustedDB) leverage non-standard trusted computing devices, and are designed to work around the architectural limitations of the specific  ...  The authors would like to thank the reviewers and the shepherd for their great comments and suggestions on improving the quality of the paper.  ... 
doi:10.2478/popets-2019-0052 dblp:journals/popets/VinayagamurthyG19 fatcat:nosfqtk4k5ezlmqunuatpfuaqa

StealthDB: a Scalable Encrypted Database with Full SQL Query Support [article]

Alexey Gribov, Dhinakaran Vinayagamurthy, Sergey Gorbunov
2019 arXiv   pre-print
In this work we build StealthDB - an encrypted database system from Intel SGX. Our system can run on any newer generation Intel CPU.  ...  On the other hand, some encrypted database systems (e.g., Cipherbase, TrustedDB) leverage non-standard trusted computing devices, and are designed to work around the architectural limitations of the specific  ...  The authors would like to thank the reviewers and the shepherd for their great comments and suggestions on improving the quality of the paper.  ... 
arXiv:1711.02279v2 fatcat:ywqocsuulvbrviacjto5lltbce

Analytic surveillance: Big data business models in the time of privacy awareness

Eva-Patricia Fernández-Manzano, María-Isabel González-Vasco
2018 El Profesional de la Informacion  
Individual users of new technologies and on demand media distribution have witnessed the industry evolving towards an exchange model, in which data is traded for services.  ...  This of course includes media agencies, digital content distribution platforms, social networks, on-line retailers, e-health companies, etc.  ... 
doi:10.3145/epi.2018.mar.19 fatcat:ffi7tmlqdrhkfkkuhp5ega472m

Analysis and Application of Verifiable Computation Techniques in Blockchain Systems for the Energy Sector

Andreas Zeiselmair, Bernd Steinkopf, Ulrich Gallersdörfer, Alexander Bogensperger, Florian Matthes
2021 Frontiers in Blockchain  
Combining these with distributed ledger technologies leads to bottlenecks and challenges regarding privacy requirements and performance due to limited storage and computational resources.  ...  Blockchain could provide a base infrastructure for new tools and platforms that address these tasks in various aspects—ranging from dispatch optimization or dynamic load adaption to (local) market mechanisms  ...  ACKNOWLEDGMENTS The authors would like to thank all project members, especially the following colleagues: Johannes Sedlmeir, Fabiane Völter, and Benjamin Schellinger of Fraunhofer Blockchain Lab and University  ... 
doi:10.3389/fbloc.2021.725322 fatcat:q2ym7s6f6nebvijoilwvoq57ty

Censorship and Surveillance in the Digital Age: The Technological Challenges for Academics

Leonie Maria Tanczer, Ryan McConville, Peter Maynard
2016 Journal of Global Security Studies  
We are grateful for their wise and helpful suggestions on earlier drafts and would also like to thank the anonymous reviewers and editors for their insightful comments.  ...  ACKNOWLEDGEMENTS The authors are indebted to Amalia Campos Delgado, Jana Eyssel, Josh Milburn, Anne Schroeter, Kyle Shuttleworth, Pauric Ward and all participants of the Leverhulme (LINCS) PhD Reading  ...  At this moment in time, many universities and curricula still seem oblivious to these questions.  ... 
doi:10.1093/jogss/ogw016 fatcat:a2nusminyzhftpdgvuymzw6wre

NEXTLEAP

Harry Halpin
2017 Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17  
Second, secure messaging applications ranging from Signal to WhatsApp may deliver the content in an encrypted form, but they do not protect the metadata of the message and they rely on centralized servers  ...  NEXTLEAP proposes an alternative decentralized and privacy-enhanced architecture.  ...  OpenID Connect uses OAuth 2.0 for the authorization ow for Single-Sign On (SSO) while adding a small number of non-opaque identi ers in the response between an identity provider and relying party as well  ... 
doi:10.1145/3098954.3104056 dblp:conf/IEEEares/Halpin17 fatcat:z74xcth2ezhwji3ytsunuudpae
« Previous Showing results 1 — 15 out of 109 results