Filters








938 Hits in 5.3 sec

Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data

D. Clarke, G.E. Suh, B. Gassend, A. Sudan, M. van Dijk, S. Devadas
2005 IEEE Symposium on Security and Privacy (S&P'05)  
We present an adaptive tree-log scheme to improve the performance of checking the integrity of arbitrarily-large untrusted data, when using only a small fixed-sized trusted state.  ...  to a constant bandwidth overhead.  ...  moves from a logarithmic bandwidth overhead to a constant bandwidth overhead, ignoring the bandwidth consumption of intermediate log-hash integrity checks.  ... 
doi:10.1109/sp.2005.24 dblp:conf/sp/ClarkeSGSDD05 fatcat:aohokg7p2rgktnafgcjziegzoe

Authentication and integrity in outsourced databases

Einar Mykletun, Maithili Narasimha, Gene Tsudik
2006 ACM Transactions on Storage  
One of the core security requirements is providing efficient mechanisms to ensure data integrity and authenticity while incurring minimal computation and bandwidth overhead.  ...  In this work, we investigate the problem of ensuring data integrity and suggest secure and practical schemes that help facilitate authentication of query replies.  ...  It would involve minimal querier computation overhead and constant (only in terms of integrity information) querier bandwidth overhead.  ... 
doi:10.1145/1149976.1149977 fatcat:r3mjictinnevzf6ksknskagdge

SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms [chapter]

Xinwen Zhang, Jean-Pierre Seifert, Onur Acıiçmez
2010 Lecture Notes in Computer Science  
untrusted domains on mobile platform.  ...  SEIP is a simple and efficient but yet effective solution for the integrity protection of real-world cellular phone platforms, which is motivated by the disadvantages of applying traditional integrity  ...  Towards this issue, we propose some particular trusted processes can accept untrusted information while maintaining their integrity level.  ... 
doi:10.1007/978-3-642-17650-0_9 fatcat:xwg3vb6hv5eanj5gnr57e5w6c4

Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset

Thang Hoang, Muslum Ozgur Ozmen, Yeongjin Jang, Attila A. Yavuz
2019 Proceedings on Privacy Enhancing Technologies  
However, due to the logarithmic communication overhead of ORAM, the composition of ORAM and SE is known to be costly in the conventional client-server model, which poses a critical barrier toward its practical  ...  We harness Intel SGX to realize efficient oblivious data structures for oblivious search/update purposes.  ...  Acknowledgments We would like to thank all the anonymous reviewers for their insightful comments and suggestions to improve the quality of this paper.  ... 
doi:10.2478/popets-2019-0010 dblp:journals/popets/HoangOJY19 fatcat:6mztyoztvfa4bh5by3rpyspmky

SESAME: Software defined Enclaves to Secure Inference Accelerators with Multi-tenant Execution [article]

Sarbartha Banerjee, Prakash Ramrakhyani, Shijia Wei, Mohit Tiwari
2020 arXiv   pre-print
This vertically integrated approach requires new hardware data-structures to partition, clear, and shape the utilization of hardware resources; and a compiler that instantiates and schedules these data-structures  ...  We propose to address these security and performance problems by bringing enclaves into the realm of accelerator-rich architectures.  ...  the cost of integrity checks or oblivious main memory accesses in a secure data-center facility, or the price of obfuscating code when it might be public.  ... 
arXiv:2007.06751v2 fatcat:e2nq6hsp4rbi5p4mn3v27lecfu

A secure coprocessor for database applications

Arvind Arasu, Ken Eguro, Raghav Kaushik, Donald Kossmann, Ravi Ramamurthy, Ramarathnam Venkatesan
2013 2013 23rd International Conference on Field programmable Logic and Applications  
This combination, called Cipherbase, leverages efficient division of laborusing a conventional untrusted cloud server to handle mundane database operations while sensitive data is segregated and processed  ...  In this paper, we describe a novel secure FPGA-based query coprocessor and discuss how it can be tightly integrated with a commercial database system such as SQL Server.  ...  Here, the overhead of transmitting data back and forth between the client and cloud server easily dwarfs the time actually spent computing.  ... 
doi:10.1109/fpl.2013.6645524 dblp:conf/fpl/ArasuEKKRV13 fatcat:kbbqj7li6rccna4jcsvvdrktuu

SafetyNets: Verifiable Execution of Deep Neural Networks on an Untrusted Cloud [article]

Zahra Ghodsi, Tianyu Gu, Siddharth Garg
2017 arXiv   pre-print
We propose SafetyNets, a framework that enables an untrusted server (the cloud) to provide a client with a short mathematical proof of the correctness of inference tasks that they perform on behalf of  ...  SafetyNets detects any incorrect computations of the neural network by the untrusted server with high probability, while achieving state-of-the-art accuracy on the MNIST digit recognition (99.4%) and TIMIT  ...  Conversely, SafetyNets is targeted towards applications where integrity is critical, but does not provide privacy.  ... 
arXiv:1706.10268v1 fatcat:3livqjsxqrdwphadwyq4rqo2ue

Dynamic audit services for integrity verification of outsourced storages in clouds

Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau
2011 Proceedings of the 2011 ACM Symposium on Applied Computing - SAC '11  
In this paper, we propose a dynamic audit service for verifying the integrity of untrusted and outsourced storage.  ...  Our experimental results not only validate the effectiveness of our approaches, but also show our audit system has a lower computation overhead, as well as a shorter extra storage for audit metedata.  ...  Our scheme was deployed in this server, and then it can implement the integrity checking in S3 storage according to the assigned schedule via 250 MB/sec of network bandwidth.  ... 
doi:10.1145/1982185.1982514 dblp:conf/sac/ZhuWHAHY11 fatcat:uxxfjaq63jhwxbgqe4sfnrcc6a

Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems [chapter]

Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doom, Pradeep Khosla
2007 Advances in Information Security  
We propose a primitive, called Pioneer, as a first step towards verifiable code execution on untrusted legacy hosts.  ...  ACKNOWLEDGMENTS We gratefully acknowledge support and feedback of, and fruitful discussions with William Arbaugh, Mike Burrows, George Cox, David Durham, David Grawrock, Jon Howell, John Richardson, Dave  ...  Second, since the adversary usually has a constant overhead per iteration, the relative overhead increases with a smaller checksum loop. Low variance of execution time.  ... 
doi:10.1007/978-0-387-44599-1_12 fatcat:qk2dv6kqvnccxhrjwxnhh5rdqe

NVM heaps for accelerating browser-based applications

Sudarsun Kannan, Ada Gavrilovska, Karsten Schwan, Sanjay Kumar
2013 Proceedings of the 1st Workshop on Interactions of NVM/FLASH with Operating Systems and Workloads - INFLOW '13  
in serialization overheads for browser based applications, and improved application performance.  ...  To address this, we explore the utility of next generation non-volatile memories (NVM) in client platforms.  ...  Considering the rapid growth of end user devices with a rich pool of applications, almost all framework is moving towards some form of sandboxing model.  ... 
doi:10.1145/2527792.2527796 dblp:conf/sosp/KannanGSK13 fatcat:6yorwulvzjg5bpy7ojnszutyx4

Pioneer

Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, Pradeep Khosla
2005 ACM SIGOPS Operating Systems Review  
We propose a primitive, called Pioneer, as a first step towards verifiable code execution on untrusted legacy hosts.  ...  ACKNOWLEDGMENTS We gratefully acknowledge support and feedback of, and fruitful discussions with William Arbaugh, Mike Burrows, George Cox, David Durham, David Grawrock, Jon Howell, John Richardson, Dave  ...  Second, since the adversary usually has a constant overhead per iteration, the relative overhead increases with a smaller checksum loop. Low variance of execution time.  ... 
doi:10.1145/1095809.1095812 fatcat:x5ct3cryhfgapajhlwlvxau2ma

Pioneer

Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, Pradeep Khosla
2005 Proceedings of the twentieth ACM symposium on Operating systems principles - SOSP '05  
We propose a primitive, called Pioneer, as a first step towards verifiable code execution on untrusted legacy hosts.  ...  ACKNOWLEDGMENTS We gratefully acknowledge support and feedback of, and fruitful discussions with William Arbaugh, Mike Burrows, George Cox, David Durham, David Grawrock, Jon Howell, John Richardson, Dave  ...  Second, since the adversary usually has a constant overhead per iteration, the relative overhead increases with a smaller checksum loop. Low variance of execution time.  ... 
doi:10.1145/1095810.1095812 dblp:conf/sosp/SeshadriLSPDK05 fatcat:tvvjguxuczcctjc76u4bciwzhu

Unified Declarative Platform for Secure Netwoked Information Systems

Wenchao Zhou, Yun Mao, Boon Thau Loo, Martín Abadi
2009 Proceedings / International Conference on Data Engineering  
Finally, using a local cluster and the PlanetLab testbed, we perform a detailed performance study of a variety of secure networked systems implemented using our platform.  ...  Our work builds upon techniques from logic-based trust management systems, declarative networking, and data analysis via provenance. We make the following contributions.  ...  , security policies are not integrated with the policy for exporting data.  ... 
doi:10.1109/icde.2009.58 dblp:conf/icde/ZhouMLA09 fatcat:g3sb72ml5vfntgpzlzewxzrftu

The Secure Machine: Efficient Secure Execution On Untrusted Platforms [article]

Ofir Shwartz, Yitzhak Birk
2018 arXiv   pre-print
data securely while running on an untrusted computing environment.  ...  We developed Distributed Memory Integrity Trees, a method for enhancing single node integrity trees for preserving the integrity of a distributed application running on an untrusted computing environment  ...  , memory and bandwidth moreover grows with the number of cores.  ... 
arXiv:1803.03951v1 fatcat:judqg442wvekdbevambchu3o6i

Efficient audit service outsourcing for data integrity in clouds

Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Stephen S. Yau
2012 Journal of Systems and Software  
Provable data possession (PDP), which is a cryptographic technique for verifying the integrity of data without retrieving it at an untrusted server, can be used to realize audit services.  ...  To avoid the security risks, audit services are critical to ensure the integrity and availability of outsourced data and to achieve digital forensics and credibility on cloud computing.  ...  The work of Yan Zhu was supported by the National Natural Science Foundation of China (Project No. 61170264 and No. 10990011).  ... 
doi:10.1016/j.jss.2011.12.024 fatcat:72fw246fnrfvdnvo43qcgv6p3y
« Previous Showing results 1 — 15 out of 938 results