A manifesto for future generation cloud computing: Research directions for the next decade
The Cloud computing paradigm has revolutionised the computer science horizon during the
past decade and has enabled the emergence of computing as the fifth utility. It has captured …
past decade and has enabled the emergence of computing as the fifth utility. It has captured …
Oblivious {Multi-Party} machine learning on trusted processors
Privacy-preserving multi-party machine learning allows multiple organizations to perform
collaborative data analytics while guaranteeing the privacy of their individual datasets …
collaborative data analytics while guaranteeing the privacy of their individual datasets …
Opaque: An oblivious and encrypted distributed analytics platform
Many systems run rich analytics on sensitive data in the cloud, but are prone to data
breaches. Hardware enclaves promise data confidentiality and secure execution of arbitrary …
breaches. Hardware enclaves promise data confidentiality and secure execution of arbitrary …
Inference attacks on property-preserving encrypted databases
Many encrypted database (EDB) systems have been proposed in the last few years as cloud
computing has grown in popularity and data breaches have increased. The state-of-the-art …
computing has grown in popularity and data breaches have increased. The state-of-the-art …
Shielding applications from an untrusted cloud with haven
Today's cloud computing infrastructure requires substantial trust. Cloud users rely on both
the provider's staff and its globally distributed software/hardware platform not to expose any …
the provider's staff and its globally distributed software/hardware platform not to expose any …
VC3: Trustworthy data analytics in the cloud using SGX
We present VC3, the first system that allows users to run distributed MapReduce
computations in the cloud while kee** their code and data secret, and ensuring the …
computations in the cloud while kee** their code and data secret, and ensuring the …
Generic attacks on secure outsourced databases
Recently, various protocols have been proposed for securely outsourcing database storage
to a third party server, ranging from systems with" full-fledged" security based on strong …
to a third party server, ranging from systems with" full-fledged" security based on strong …
Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities
When two or more parties need to compute a common result while safeguarding their
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …
{zkLedger}:{Privacy-Preserving} auditing for distributed ledgers
Distributed ledgers (eg blockchains) enable financial institutions to efficiently reconcile cross-
organization transactions. For example, banks might use a distributed ledger as a settlement …
organization transactions. For example, banks might use a distributed ledger as a settlement …
Processing analytical queries over encrypted data
MONOMI is a system for securely executing analytical workloads over sensitive data on an
untrusted database server. MONOMI works by encrypting the entire database and running …
untrusted database server. MONOMI works by encrypting the entire database and running …