Security and privacy in cloud computing: technical review

YS Abdulsalam, M Hedabou - Future Internet, 2021 - mdpi.com
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …

Ensuring security and privacy preservation for cloud data services

J Tang, Y Cui, Q Li, K Ren, J Liu, R Buyya - ACM Computing Surveys …, 2016 - dl.acm.org
With the rapid development of cloud computing, more and more enterprises/individuals are
starting to outsource local data to the cloud servers. However, under open networks and not …

Practical dynamic searchable encryption with small leakage

E Stefanov, C Papamanthou, E Shi - Cryptology ePrint Archive, 2013 - eprint.iacr.org
Abstract Dynamic Searchable Symmetric Encryption (DSSE) enables a client to encrypt his
document collection in a way that it is still searchable and efficiently updatable. However, all …

Path ORAM: an extremely simple oblivious RAM protocol

E Stefanov, M Dijk, E Shi, THH Chan… - Journal of the ACM …, 2018 - dl.acm.org
We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …

Oblix: An efficient oblivious search index

P Mishra, R Poddar, J Chen, A Chiesa… - 2018 IEEE symposium …, 2018 - ieeexplore.ieee.org
Search indices are fundamental building blocks of many systems, and there is great interest
in running them on encrypted data. Unfortunately, many known schemes that enable search …

Circuit oram: On tightness of the goldreich-ostrovsky lower bound

X Wang, H Chan, E Shi - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
We propose a new tree-based ORAM scheme called Circuit ORAM. Circuit ORAM makes
both theoretical and practical contributions. From a theoretical perspective, Circuit ORAM …

Oblivious RAM with O((logN)3) Worst-Case Cost

E Shi, THH Chan, E Stefanov, M Li - … on The Theory and Application of …, 2011 - Springer
Oblivious RAM is a useful primitive that allows a client to hide its data access patterns from
an untrusted server in storage outsourcing applications. Until recently, most prior works on …

Scaling ORAM for secure computation

J Doerner, A Shelat - Proceedings of the 2017 ACM SIGSAC Conference …, 2017 - dl.acm.org
We design and implement a Distributed Oblivious Random Access Memory (DORAM) data
structure that is optimized for use in two-party secure computation protocols. We improve …

WITHDRAWN: Dynamic remote data auditing for securing big data storage in cloud computing

M Sookhak, A Gani, MK Khan, R Buyya - 2017 - Elsevier
WITHDRAWN: Dynamic remote data auditing for securing big data storage in cloud
computing - ScienceDirect Skip to main contentSkip to article Elsevier logo Journals & …

Oblivistore: High performance oblivious cloud storage

E Stefanov, E Shi - 2013 IEEE Symposium on Security and …, 2013 - ieeexplore.ieee.org
We design and build ObliviStore, a high performance, distributed ORAM-based cloud data
store secure in the malicious model. To the best of our knowledge, ObliviStore is the fastest …