Security and privacy in cloud computing: technical review
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …
to the popularity and success of cloud computing. Cloud computing offers advantages and …
Ensuring security and privacy preservation for cloud data services
With the rapid development of cloud computing, more and more enterprises/individuals are
starting to outsource local data to the cloud servers. However, under open networks and not …
starting to outsource local data to the cloud servers. However, under open networks and not …
Practical dynamic searchable encryption with small leakage
Abstract Dynamic Searchable Symmetric Encryption (DSSE) enables a client to encrypt his
document collection in a way that it is still searchable and efficiently updatable. However, all …
document collection in a way that it is still searchable and efficiently updatable. However, all …
Path ORAM: an extremely simple oblivious RAM protocol
We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …
Oblix: An efficient oblivious search index
Search indices are fundamental building blocks of many systems, and there is great interest
in running them on encrypted data. Unfortunately, many known schemes that enable search …
in running them on encrypted data. Unfortunately, many known schemes that enable search …
Circuit oram: On tightness of the goldreich-ostrovsky lower bound
We propose a new tree-based ORAM scheme called Circuit ORAM. Circuit ORAM makes
both theoretical and practical contributions. From a theoretical perspective, Circuit ORAM …
both theoretical and practical contributions. From a theoretical perspective, Circuit ORAM …
Oblivious RAM with O((logN)3) Worst-Case Cost
Oblivious RAM is a useful primitive that allows a client to hide its data access patterns from
an untrusted server in storage outsourcing applications. Until recently, most prior works on …
an untrusted server in storage outsourcing applications. Until recently, most prior works on …
Scaling ORAM for secure computation
We design and implement a Distributed Oblivious Random Access Memory (DORAM) data
structure that is optimized for use in two-party secure computation protocols. We improve …
structure that is optimized for use in two-party secure computation protocols. We improve …
WITHDRAWN: Dynamic remote data auditing for securing big data storage in cloud computing
M Sookhak, A Gani, MK Khan, R Buyya - 2017 - Elsevier
WITHDRAWN: Dynamic remote data auditing for securing big data storage in cloud
computing - ScienceDirect Skip to main contentSkip to article Elsevier logo Journals & …
computing - ScienceDirect Skip to main contentSkip to article Elsevier logo Journals & …
Oblivistore: High performance oblivious cloud storage
We design and build ObliviStore, a high performance, distributed ORAM-based cloud data
store secure in the malicious model. To the best of our knowledge, ObliviStore is the fastest …
store secure in the malicious model. To the best of our knowledge, ObliviStore is the fastest …