Filters








94 Hits in 6.6 sec

Privacy-Preserving Group Data Access via Stateless Oblivious RAM Simulation [article]

Michael T. Goodrich, Michael Mitzenmacher, Olga Ohrimenko, Roberto Tamassia
2011 arXiv   pre-print
We show that such privacy-preserving data access is possible using a combination of probabilistic encryption, which directly hides data values, and stateless oblivious RAM simulation, which hides the pattern  ...  We study the problem of providing privacy-preserving access to an outsourced honest-but-curious data repository for a group of trusted users.  ...  Thus, these methods are not applicable to the problem of providing privacy-preserving group access to an outsourced data repository.  ... 
arXiv:1105.4125v1 fatcat:zwmxxbfsnreejkkcvdsoz4yrda

Privacy-Preserving Group Data Access via Stateless Oblivious RAM Simulation [chapter]

Michael T. Goodrich, Michael Mitzenmacher, Olga Ohrimenko, Roberto Tamassia
2012 Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms  
We show how to achieve efficient privacy-preserving data access using a combination of probabilistic encryption, which directly hides data values, and stateless oblivious RAM simulation, which hides the  ...  Motivated by cloud computing applications, we study the problem of providing privacy-preserving access to an outsourced honest-but-curious data repository for a group of trusted users.  ...  Thus, these methods are not applicable to the problem of providing privacy-preserving group access to an outsourced data repository.  ... 
doi:10.1137/1.9781611973099.14 dblp:conf/soda/GoodrichMOT12 fatcat:imoznu4hdrcf5asijx464nfd6i

Oblivious Computation with Data Locality [article]

Gilad Asharov, T.-H. Hubert Chan, Kartik Nayak, Rafael Pass, Ling Ren, Elaine Shi
2017 IACR Cryptology ePrint Archive  
Oblivious RAMs, introduced by Goldreich and Ostrovsky [JACM'96], compile any RAM program into one that is "memory oblivious", i.e., the access pattern to the memory is independent of the input.  ...  All previous ORAM schemes, however, completely break the locality of data accesses (for instance, by shuffling the data to pseudorandom positions in memory).  ...  Warmup: Oblivious simulation of a stateless deterministic functionality. We consider machines that interact with the memory via move and read/write operations.  ... 
dblp:journals/iacr/AsharovCNPRS17 fatcat:iqcyyo7b2jcg5nb5eehsnrztnu

PrivateFS

Peter Williams, Radu Sion, Alin Tomescu
2012 Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12  
Privatefs is an oblivious file system that enables access to remote storage, while keeping both the file contents and client access patterns secret.  ...  privacy leaks.  ...  RELATED WORK Oblivious RAM, introduced by Goldreich and Ostrovsky [2] is a primitive that provides access pattern privacy to a single client (or software process) accessing a remote database (or RAM)  ... 
doi:10.1145/2382196.2382299 dblp:conf/ccs/WilliamsST12 fatcat:zlz2cnu4hjazba4lkq5blkh2te

Anonymous RAM [chapter]

Michael Backes, Amir Herzberg, Aniket Kate, Ivan Pryvalov
2016 Lecture Notes in Computer Science  
AnonRAM combines privacy features of anonymous communication and oblivious RAM (ORAM) schemes, allowing it to protect, simultaneously, the privacy of content, access patterns and user's identity, from  ...  We define the concept of and present provably secure constructions for Anonymous RAM (AnonRAM), a novel multi-user storage primitive that offers strong privacy and integrity guarantees.  ...  This in particular includes the tasks of data privacy, i.e., hiding users' data from overly curious entities such as the provider, as well as access privacy, i.e., hiding information about data-access  ... 
doi:10.1007/978-3-319-45744-4_17 fatcat:p3nwnpbex5gfpd36ncyi6xa4ju

Shroud: ensuring private access to large-scale data in the data center

Jacob R. Lorch, Bryan Parno, James W. Mickens, Mariana Raykova, Joshua Schiffman
2013 USENIX Conference on File and Storage Technologies  
Shroud aggressively targets hiding accesses among hundreds of terabytes of data. We achieve our goals by adapting oblivious RAM algorithms to enable large-scale parallelization.  ...  Thus, we present Shroud, a general storage system that hides data access patterns from the servers running it, protecting user privacy.  ...  The user sends an encrypted request to the coprocessor, which uses an Oblivious RAM (ORAM) protocol to access the requested block and return it to the user via the secure channel (Fig. 1 ).  ... 
dblp:conf/fast/LorchPM0S13 fatcat:j3kn5x446bgxzneagxrww37ifm

Security and Privacy in Cloud Computing: Technical Review

Yunusa Simpa Abdulsalam, Mustapha Hedabou
2021 Future Internet  
The literature has further focused on only highlighting security and privacy issues without providing adequate technical approaches to mitigate such security and privacy threats.  ...  The literature also provides an extensive review of security and privacy issues in cloud computing.  ...  Privacy-preserving group data access via stateless oblivious RAM simulation.  ... 
doi:10.3390/fi14010011 fatcat:rzfmwfbxujcu7ohcecbqsb6p2a

Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities

Joseph I. Choi, Kevin R. B. Butler
2019 Security and Communication Networks  
This paper also addresses three open challenges: (1) defeating malicious adversaries, (2) mobile-friendly TEE-supported SMC, and (3) a more general coupling of trusted hardware and privacy-preserving computation  ...  Trusted execution environments (TEEs) provide hardware-enforced isolation of code and data in use, making them promising candidates for making SMC more tractable.  ...  This approach builds on Oblivious RAM (ORAM) [41] , a technique for concealing access patterns to data on a remote storage by continuous shuffling and reencrypting data as it is accessed.  ... 
doi:10.1155/2019/1368905 fatcat:izynm6msrvehfa3ghkw7tykk34

Snoopy: Surpassing the Scalability Bottleneck of Oblivious Storage [article]

Emma Dauterman, Vivian Fang, Ioannis Demertzis, Natacha Crooks, Raluca Ada Popa
2021 IACR Cryptology ePrint Archive  
Existing oblivious storage systems provide strong security by hiding access patterns, but do not scale to sustain high throughput as they rely on a central point of coordination.  ...  For the same data size, Snoopy uses 18 machines to scale to 92K requests/s with average latency under 500ms. * Equal contribution.  ...  We would also like to thank Hong Jun Jeon for his help in navigating the balls-into-bins literature, and Su Le, Pratyush Mishra, and students in the RISELab security group for giving feedback that improved  ... 
dblp:journals/iacr/DautermanFDCP21 fatcat:pmg63ttr3jambd4qop3aowwk4e

Private Circuits: Securing Hardware against Probing Attacks [chapter]

Yuval Ishai, Amit Sahai, David Wagner
2003 Lecture Notes in Computer Science  
We consider the problem of protecting privacy in circuits, when faced with an adversary that can access a bounded number of wires in the circuit.  ...  This question is motivated by side channel attacks, which allow an adversary to gain partial access to the inner workings of hardware.  ...  [9] ), which attempt to ef£ciently secure storage (but not computation) against probing attacks, and work on oblivious RAM (cf.  ... 
doi:10.1007/978-3-540-45146-4_27 fatcat:24yjy7hetzaafhfptgx3zlt4me

Ensuring Security and Privacy Preservation for Cloud Data Services

Jun Tang, Yong Cui, Qi Li, Kui Ren, Jiangchuan Liu, Rajkumar Buyya
2016 ACM Computing Surveys  
We then dwell on existing protection solutions to achieve secure, dependable, and privacy-assured cloud data services including data search, data computation, data sharing, data storage, and data access  ...  However, under open networks and not fully trusted cloud environments, they face enormous security and privacy risks (e.g., data leakage or disclosure, data corruption or loss, and user privacy breach)  ...  By leveraging probabilistic encryption and stateless ORAM simulation, Goodrich et al. [2012b] construct another parallel ORAM scheme that ensures access pattern privacy under arbitrary operations on  ... 
doi:10.1145/2906153 fatcat:c57iz6lswvfxbmhireksha35vm

Can We Access a Database Both Locally and Privately? [chapter]

Elette Boyle, Yuval Ishai, Rafael Pass, Mary Wootters
2017 Lecture Notes in Computer Science  
Towards solving the above problem, we study a weaker secret key variant where the data is encoded and accessed by the same party.  ...  This primitive, that we call an oblivious locally decodable code (OLDC), is independently motivated by applications such as searchable symmetric encryption.  ...  Suppose we want to allow efficient and privacy-preserving access to a large database x ∈ {0, 1} n .  ... 
doi:10.1007/978-3-319-70503-3_22 fatcat:wmlspzu6hbfu7fppwkhy3osjma

Efficient Strong Privacy-Preserving Conjunctive Keyword Search Over Encrypted Cloud Data [article]

Chang Xu, Ruijuan Wang, Liehuang Zhu, Chuan Zhang, Rongxing Lu, Kashif Sharif
2022 arXiv   pre-print
The results show that our scheme has strong privacy preservation and efficiency.  ...  We propose the first DSSE scheme to address the above concerns that achieves strong privacy-preserving conjunctive keyword search.  ...  [19] first defined forward privacy SSE and proposed the first efficient DSSE scheme that achieves small leakage based on oblivious RAM (ORAM).  ... 
arXiv:2203.13662v1 fatcat:4wpq7v3slvfexb3pjavdqbui54

Secure and Efficient Query Processing in Outsourced Databases [article]

Dmytro Bogatov
2022 arXiv   pre-print
Various cryptographic techniques are used in outsourced database systems to ensure data privacy while allowing for efficient querying.  ...  ℰpsolute proposes a definition, construction, analysis, and experimental evaluation of a system that provably hides both access pattern and communication volume while remaining efficient.  ...  Oblivious Random Access Machine Informally, Oblivious Random Access Machine (ORAM) is a mechanism that lets the users hide their access pattern to remote storage.  ... 
arXiv:2206.10753v1 fatcat:mgjmrvs52zef3aioswftvfd3fa

Decentralized and Privacy Sensitive Data De-Duplication Framework for Convenient Big Data Management in Cloud Backup Systems

J. Gnana Jeslin, P. Mohan Kumar
2022 Symmetry  
The rapidly rising data volume in the cloud, mostly on one side, is followed by a large replication of data.  ...  Finally, the protection and efficiency audit demonstrate that the data integrity and accuracy of our system are ensured and symmetrically effective in the management of data ownership.  ...  from our simulation  ... 
doi:10.3390/sym14071392 fatcat:qpivhfig7zao5htw4xvyt2224q
« Previous Showing results 1 — 15 out of 94 results