A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Query processing in multilevel secure distributed databases
2014
2014 IEEE International Advance Computing Conference (IACC)
We implement ObliDB and show that, on analytics workloads, ObliDB ranges from 1.1-19× faster than Opaque, a previous oblivious, enclave-based system designed only for analytics, and comes within 2.6× of ...
These enclaves provide an execution environment isolated from the hypervisor/OS, and encrypt data in RAM. ...
Acknowledgments We would like to thank Ankur Dave and Wenting Zheng for their assistance in reproducing the Opaque benchmarks, as well as Henry Corrigan-Gibbs for many helpful conversations. ...
doi:10.1109/iadcc.2014.6779373
fatcat:w3hlim3rezgr7k4cfgqfibbmei
ObliDB: Oblivious Query Processing for Secure Databases
[article]
2019
arXiv
pre-print
We implement ObliDB and show that, on analytics work-loads, ObliDB ranges from 1.1-19x faster than Opaque,a previous oblivious, enclave-based system designed only for analytics, and comes within 2.6x of ...
These enclaves provide an execution environment isolated from the hypervisor/OS, and encrypt data in RAM. ...
Acknowledgments We would like to thank Ankur Dave and Wenting Zheng for their assistance in reproducing the Opaque benchmarks, as well as Henry Corrigan-Gibbs for many helpful conversations. ...
arXiv:1710.00458v6
fatcat:da3l3u2safakzmx3oscjhiru5a
StreamBox-TZ: Secure Stream Analytics at the Edge with TrustZone
[article]
2019
arXiv
pre-print
In response, we present StreamBox-TZ (SBT), a stream analytics engine for an edge platform that offers strong data security, verifiable results, and good performance. ...
On an octa core ARMv8 platform, it delivers the state-of-the-art performance by processing input events up to 140 MB/sec (12M events/sec) with sub-second delay. ...
Third, a few systems, notably VC3 [89] and Opaque [109] , use TEE to protect data operators of distributed analytics. ...
arXiv:1808.05078v2
fatcat:vnw7bj746fa4fnde2tavt7vtye
The ESA design, and its Prochlo implementation, are informed by our practical experiences with an existing, large deployment of privacy-preserving software monitoring. (cont.; see the paper) ...
We thank the anonymous reviewers for their detailed feedback, and Martín Abadi, Johannes Gehrke, Lea Kissner, Noé Lutz, and Nicolas Papernot for their valuable advice on earlier drafts. ...
Opaque uses SGX-based ColumnSort for private-data analytics [78] . ...
doi:10.1145/3132747.3132769
dblp:conf/sosp/BittauEMMRLRKTS17
fatcat:s5icmqnn6jgznjqhh4fo4fzahm
SGX-MR: Regulating Dataflows for Protecting Access Patterns of Data-Intensive SGX Applications
[article]
2020
arXiv
pre-print
Intel SGX has been a popular trusted execution environment (TEE) for protecting the integrity and confidentiality of applications running on untrusted platforms such as cloud. ...
Researchers have been experimenting with Oblivious RAM (ORAM) to address the privacy of access patterns. ...
Opaque [36] tries to revise Spark for SGX. ...
arXiv:2009.03518v1
fatcat:zfa64wp5brhmvpvrmmk7c7vlka
SGX-MR: Regulating Dataflows for Protecting Access Patterns of Data-Intensive SGX Applications
2021
Proceedings on Privacy Enhancing Technologies
AbstractIntel SGX has been a popular trusted execution environment (TEE) for protecting the integrity and confidentiality of applications running on untrusted platforms such as cloud. ...
Researchers have been experimenting with Oblivious RAM (ORAM) to address the privacy of access patterns. ...
Acknowledgement We thank our shepherd Claudio Soriente and all the anonymous reviewers for their guidance and insightful comments on improving this paper. ...
doi:10.2478/popets-2021-0002
fatcat:6chbzxlpobeytaysxwe353cyom
SecGrid: A Secure and Efficient SGX-enabled Smart Grid System with Rich Functionalities
[article]
2018
arXiv
pre-print
Existing solutions in smart grid usually use cryptographic tools, such as homomorphic encryption, to protect individual privacy, which, however, can only support limited and simple functionalities. ...
Smart grid adopts two-way communication and rich functionalities to gain a positive impact on the sustainability and efficiency of power usage, but on the other hand, also poses serious challenges to customers ...
Opaque [33] is an encrypted data analytics platform over Spark SQL, which uses oblivious sorting for data processing in an encrypted database. ...
arXiv:1810.01651v1
fatcat:nei3o6c2ejc6ngd5u7x2lyfwva
Strongly Secure and Efficient Data Shuffle On Hardware Enclaves
[article]
2017
arXiv
pre-print
Mitigating memory-access attacks on the Intel SGX architecture is an important and open research problem. ...
A natural notion of the mitigation is cache-miss obliviousness which requires the cache-misses emitted during an enclave execution are oblivious to sensitive data. ...
Various data-analytical systems are developed based on the computation-specific oblivious algorithms, such as Opaque [29] for relational data analytics and oblivious machine learning [24] . ese systems ...
arXiv:1711.04243v1
fatcat:duvcrbso3jf2lpfkobbuc7ybdm
A demonstration of sterling
2018
Proceedings of the VLDB Endowment
Acknowledgements We would like to thank Ce Zhang, Dan Alistarh, and Claudiu Musat for their helpful feedback and discussion. ...
Upon this generic platform, we build a market for privacy-preserving machine learning data and models. ...
There have been several attempts at creating distributed AI and data marketplaces for public datasets, some of which are implemented as smart contracts on distributed ledgers known as blockchains. ...
doi:10.14778/3229863.3236266
fatcat:t6rjy7ta7faanekrgvg44s6ejy
StealthDB: a Scalable Encrypted Database with Full SQL Query Support
2019
Proceedings on Privacy Enhancing Technologies
In this work we build StealthDB – an encrypted database system from Intel SGX. Our system can run on any newer generation Intel CPU. ...
On the other hand, some encrypted database systems (e.g., Cipherbase, TrustedDB) leverage non-standard trusted computing devices, and are designed to work around the architectural limitations of the specific ...
The authors would like to thank the reviewers and the shepherd for their great comments and suggestions on improving the quality of the paper. ...
doi:10.2478/popets-2019-0052
dblp:journals/popets/VinayagamurthyG19
fatcat:nosfqtk4k5ezlmqunuatpfuaqa
StealthDB: a Scalable Encrypted Database with Full SQL Query Support
[article]
2019
arXiv
pre-print
In this work we build StealthDB - an encrypted database system from Intel SGX. Our system can run on any newer generation Intel CPU. ...
On the other hand, some encrypted database systems (e.g., Cipherbase, TrustedDB) leverage non-standard trusted computing devices, and are designed to work around the architectural limitations of the specific ...
The authors would like to thank the reviewers and the shepherd for their great comments and suggestions on improving the quality of the paper. ...
arXiv:1711.02279v2
fatcat:ywqocsuulvbrviacjto5lltbce
Analytic surveillance: Big data business models in the time of privacy awareness
2018
El Profesional de la Informacion
Individual users of new technologies and on demand media distribution have witnessed the industry evolving towards an exchange model, in which data is traded for services. ...
This of course includes media agencies, digital content distribution platforms, social networks, on-line retailers, e-health companies, etc. ...
doi:10.3145/epi.2018.mar.19
fatcat:ffi7tmlqdrhkfkkuhp5ega472m
Analysis and Application of Verifiable Computation Techniques in Blockchain Systems for the Energy Sector
2021
Frontiers in Blockchain
Combining these with distributed ledger technologies leads to bottlenecks and challenges regarding privacy requirements and performance due to limited storage and computational resources. ...
Blockchain could provide a base infrastructure for new tools and platforms that address these tasks in various aspects—ranging from dispatch optimization or dynamic load adaption to (local) market mechanisms ...
ACKNOWLEDGMENTS The authors would like to thank all project members, especially the following colleagues: Johannes Sedlmeir, Fabiane Völter, and Benjamin Schellinger of Fraunhofer Blockchain Lab and University ...
doi:10.3389/fbloc.2021.725322
fatcat:q2ym7s6f6nebvijoilwvoq57ty
Censorship and Surveillance in the Digital Age: The Technological Challenges for Academics
2016
Journal of Global Security Studies
We are grateful for their wise and helpful suggestions on earlier drafts and would also like to thank the anonymous reviewers and editors for their insightful comments. ...
ACKNOWLEDGEMENTS The authors are indebted to Amalia Campos Delgado, Jana Eyssel, Josh Milburn, Anne Schroeter, Kyle Shuttleworth, Pauric Ward and all participants of the Leverhulme (LINCS) PhD Reading ...
At this moment in time, many universities and curricula still seem oblivious to these questions. ...
doi:10.1093/jogss/ogw016
fatcat:a2nusminyzhftpdgvuymzw6wre
NEXTLEAP
2017
Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17
Second, secure messaging applications ranging from Signal to WhatsApp may deliver the content in an encrypted form, but they do not protect the metadata of the message and they rely on centralized servers ...
NEXTLEAP proposes an alternative decentralized and privacy-enhanced architecture. ...
OpenID Connect uses OAuth 2.0 for the authorization ow for Single-Sign On (SSO) while adding a small number of non-opaque identi ers in the response between an identity provider and relying party as well ...
doi:10.1145/3098954.3104056
dblp:conf/IEEEares/Halpin17
fatcat:z74xcth2ezhwji3ytsunuudpae
« Previous
Showing results 1 — 15 out of 109 results