Intel software guard extensions applications: A survey
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …
sensitive data from users and companies are being increasingly delegated to such systems …
SoK: A Systematic Review of TEE Usage for Develo** Trusted Applications
A Paju, MO Javed, J Nurmi, J Savimäki… - Proceedings of the 18th …, 2023 - dl.acm.org
Trusted Execution Environments (TEEs) are a feature of modern central processing units
(CPUs) that aim to provide a high assurance, isolated environment in which to run …
(CPUs) that aim to provide a high assurance, isolated environment in which to run …
Secure and lightweight deduplicated storage via shielded {deduplication-before-encryption}
Outsourced storage should fulfill confidentiality and storage efficiency for large-scale data
management. Conventional approaches often combine encryption and deduplication based …
management. Conventional approaches often combine encryption and deduplication based …
Revisiting frequency analysis against encrypted deduplication via statistical distribution
Encrypted deduplication addresses both security and storage efficiency in large-scale
storage systems: it ensures that each plaintext is encrypted to a ciphertext by a symmetric …
storage systems: it ensures that each plaintext is encrypted to a ciphertext by a symmetric …
Encrypted Data Reduction: Removing Redundancy from Encrypted Data in Outsourced Storage
Storage savings and data confidentiality are two primary goals for outsourced storage.
However, encryption by design destroys the content redundancy within plaintext data, so …
However, encryption by design destroys the content redundancy within plaintext data, so …
Featurespy: Detecting learning-content attacks via feature inspection in secure deduplicated storage
Secure deduplicated storage is a critical paradigm for cloud storage outsourcing to achieve
both operational cost savings (via deduplication) and outsourced data confidentiality (via …
both operational cost savings (via deduplication) and outsourced data confidentiality (via …
Revisiting SGX-based Encrypted Deduplication via PoW-Before-Encryption and Eliminating Redundant Computations
G Ha, X Ge, C Jia, Y Chen, Z Su - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Encrypted deduplication is attractive for outsourced storage as it provides both data
confidentiality and storage savings. Conventional encrypted deduplication schemes protect …
confidentiality and storage savings. Conventional encrypted deduplication schemes protect …
Deduplication vs Privacy Tradeoffs in Cloud Storage
Users often encrypt files they store on cloud storage services to ensure data privacy.
Unfortunately, without additional mechanisms, encrypting files prevents the use of server …
Unfortunately, without additional mechanisms, encrypting files prevents the use of server …
Secure and Efficient Cloud Ciphertext Deduplication Based on SGX
L Li, G Qin, P Liu, C Hu, S Guo - 2022 IEEE 28th International …, 2023 - ieeexplore.ieee.org
With the development of data outsourcing technology, the data stored by cloud storage
servers are exploding. Secure deduplication for encrypted data helps cloud servers reduce …
servers are exploding. Secure deduplication for encrypted data helps cloud servers reduce …
Efficient Privacy-Preserving Duplicate Elimination in Edge Computing Environment Based on Trusted Execution Environment
D Koo - KIPS Transactions on Computer and Communication …, 2022 - koreascience.kr
With the flood of digital data owing to the Internet of Things and big data, cloud service
providers that process and store vast amount of data from multiple users can apply duplicate …
providers that process and store vast amount of data from multiple users can apply duplicate …