Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

ROSE: Robust searchable encryption with forward and backward security

P Xu, W Susilo, W Wang, T Chen, Q Wu… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Dynamic searchable symmetric encryption (DSSE) has been widely recognized as a
promising technique to delegate update and search queries over an outsourced database to …

Multi-user dynamic searchable symmetric encryption with corrupted participants

JG Chamani, Y Wang, D Papadopoulos… - … on Dependable and …, 2021 - ieeexplore.ieee.org
We study the problem of multi-user dynamic searchable symmetric encryption (DMUSSE)
where a data owner stores its encrypted documents on an untrusted remote server and …

Towards efficient cryptographic data validation service in edge computing

L Xu, X Yuan, Z Zhou, C Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Edge computing brings data computation and storage closer to the mobile device to save
response time for decision making. After being processed at the edge, commonly the data …

SGX-Stream: A Secure Stream Analytics Framework In SGX-enabled Edge Cloud

K Bagher, S Lai - Journal of Information Security and Applications, 2023 - Elsevier
This paper introduces SGX-Stream, a secure and efficient data analytics framework for data
streams using Intel SGX. SGX-Stream employs sketch algorithms in a cloud–edge …

Shielddb: An encrypted document database with padding countermeasures

V Vo, X Yuan, SF Sun, JK Liu, S Nepal… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Cloud storage systems have seen a growing number of clients due to the fact that more and
more businesses and governments are shifting away from in-house data servers and …

No Forking Way: Detecting Cloning Attacks on Intel SGX Applications

S Briongos, G Karame, C Soriente… - Proceedings of the 39th …, 2023 - dl.acm.org
Forking attacks against TEEs like Intel SGX can be carried out either by rolling back the
application to a previous state, or by cloning the application and by partitioning its inputs …

[LIVRE][B] Searchable Encryption: From Concepts to Systems

K Ren, C Wang - 2023 - Springer
This book comprehensively reviews searchable encryption, which represents a series of
research developments that directly enable search functionality over encrypted data. The …

Dynamic Searchable Symmetric Encryption With Strong Security and Robustness

H Dou, Z Dan, P Xu, W Wang, S Xu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Dynamic Searchable Symmetric Encryption (DSSE) is a prospective technique in the field of
cloud storage for secure search over encrypted data. A DSSE client can issue update …

Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions

L Mei, C Xu, L Xu, X Yuan, JK Liu - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Multi-source multi-client (M/M) searchable encryption has drawn increasing attention as data
sharing becomes prevalent in the digital economics era. It allows data from multiple sources …