Intel software guard extensions applications: A survey
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …
sensitive data from users and companies are being increasingly delegated to such systems …
ROSE: Robust searchable encryption with forward and backward security
Dynamic searchable symmetric encryption (DSSE) has been widely recognized as a
promising technique to delegate update and search queries over an outsourced database to …
promising technique to delegate update and search queries over an outsourced database to …
Multi-user dynamic searchable symmetric encryption with corrupted participants
We study the problem of multi-user dynamic searchable symmetric encryption (DMUSSE)
where a data owner stores its encrypted documents on an untrusted remote server and …
where a data owner stores its encrypted documents on an untrusted remote server and …
Towards efficient cryptographic data validation service in edge computing
Edge computing brings data computation and storage closer to the mobile device to save
response time for decision making. After being processed at the edge, commonly the data …
response time for decision making. After being processed at the edge, commonly the data …
SGX-Stream: A Secure Stream Analytics Framework In SGX-enabled Edge Cloud
This paper introduces SGX-Stream, a secure and efficient data analytics framework for data
streams using Intel SGX. SGX-Stream employs sketch algorithms in a cloud–edge …
streams using Intel SGX. SGX-Stream employs sketch algorithms in a cloud–edge …
Shielddb: An encrypted document database with padding countermeasures
Cloud storage systems have seen a growing number of clients due to the fact that more and
more businesses and governments are shifting away from in-house data servers and …
more businesses and governments are shifting away from in-house data servers and …
No Forking Way: Detecting Cloning Attacks on Intel SGX Applications
Forking attacks against TEEs like Intel SGX can be carried out either by rolling back the
application to a previous state, or by cloning the application and by partitioning its inputs …
application to a previous state, or by cloning the application and by partitioning its inputs …
[LIVRE][B] Searchable Encryption: From Concepts to Systems
This book comprehensively reviews searchable encryption, which represents a series of
research developments that directly enable search functionality over encrypted data. The …
research developments that directly enable search functionality over encrypted data. The …
Dynamic Searchable Symmetric Encryption With Strong Security and Robustness
Dynamic Searchable Symmetric Encryption (DSSE) is a prospective technique in the field of
cloud storage for secure search over encrypted data. A DSSE client can issue update …
cloud storage for secure search over encrypted data. A DSSE client can issue update …
Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions
Multi-source multi-client (M/M) searchable encryption has drawn increasing attention as data
sharing becomes prevalent in the digital economics era. It allows data from multiple sources …
sharing becomes prevalent in the digital economics era. It allows data from multiple sources …