Path ORAM: an extremely simple oblivious RAM protocol

E Stefanov, M Dijk, E Shi, THH Chan… - Journal of the ACM …, 2018 - dl.acm.org
We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …

Cloud computing security: foundations and research directions

A Chakraborti, R Curtmola, J Katz… - … and Trends® in …, 2022 - nowpublishers.com
Cloud services have revolutionized modern computing. The benefits of outsourcing data and
computation come with security and privacy concerns. This monograph explores the …

Oblidb: Oblivious query processing for secure databases

S Eskandarian, M Zaharia - arxiv preprint arxiv:1710.00458, 2017 - arxiv.org
Hardware enclaves such as Intel SGX are a promising technology for improving the security
of databases outsourced to the cloud. These enclaves provide an execution environment …

Snoopy: Surpassing the scalability bottleneck of oblivious storage

E Dauterman, V Fang, I Demertzis, N Crooks… - Proceedings of the …, 2021 - dl.acm.org
Existing oblivious storage systems provide strong security by hiding access patterns, but do
not scale to sustain high throughput as they rely on a central point of coordination. To …

PanORAMa: Oblivious RAM with logarithmic overhead

S Patel, G Persiano, M Raykova… - 2018 IEEE 59th Annual …, 2018 - ieeexplore.ieee.org
We present PanORAMa, the first Oblivious RAM construction that achieves communication
overhead O (log N log log N) for database of N blocks and for any block size B= Ω (log N) …

Taostore: Overcoming asynchronicity in oblivious data storage

C Sahin, V Zakhary, A El Abbadi, H Lin… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
We consider oblivious storage systems hiding both the contents of the data as well as
access patterns from an untrusted cloud provider. We target a scenario where multiple users …

Oblivious parallel RAM and applications

E Boyle, KM Chung, R Pass - Theory of Cryptography Conference, 2015 - Springer
We initiate the study of cryptography for parallel RAM (PRAM) programs. The PRAM model
captures modern multi-core architectures and cluster computing models, where several …

Design space exploration of multiple loops on FPGAs using high level synthesis

G Zhong, V Venkataramani, Y Liang… - 2014 IEEE 32nd …, 2014 - ieeexplore.ieee.org
Real-world applications such as image processing, signal processing, and others often
contain a sequence of computation intensive kernels, each represented in the form of a …

S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing

T Hoang, CD Ozkaptan, AA Yavuz, J Guajardo… - Proceedings of the …, 2017 - dl.acm.org
Oblivious Random Access Machine (ORAM) enables a client to access her data without
leaking her access patterns. Existing client-efficient ORAMs either achieve O (log N) client …

ConcurORAM: High-throughput stateless parallel multi-client ORAM

A Chakraborti, R Sion - arxiv preprint arxiv:1811.04366, 2018 - arxiv.org
ConcurORAM is a parallel, multi-client oblivious RAM (ORAM) that eliminates waiting for
concurrent stateless clients and allows overall throughput to scale gracefully, without …