A manifesto for future generation cloud computing: Research directions for the next decade
The Cloud computing paradigm has revolutionised the computer science horizon during the
past decade and has enabled the emergence of computing as the fifth utility. It has captured …
past decade and has enabled the emergence of computing as the fifth utility. It has captured …
Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …
makes it increasingly necessary to use the cloud not just to store the data, but also to …
Label-only membership inference attacks
Membership inference is one of the simplest privacy threats faced by machine learning
models that are trained on private sensitive data. In this attack, an adversary infers whether a …
models that are trained on private sensitive data. In this attack, an adversary infers whether a …
A pragmatic introduction to secure multi-party computation
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …
to a tool for building real systems today. Over the past decade, MPC has been one of the …
Inferring fine-grained control flow inside {SGX} enclaves with branch shadowing
Intel has introduced a hardware-based trusted execution environment, Intel Software Guard
Extensions (SGX), that provides a secure, isolated execution environment, or enclave, for a …
Extensions (SGX), that provides a secure, isolated execution environment, or enclave, for a …
EnclaveDB: A secure database using SGX
We propose EnclaveDB, a database engine that guarantees confidentiality, integrity, and
freshness for data and queries. EnclaveDB guarantees these properties even when the …
freshness for data and queries. EnclaveDB guarantees these properties even when the …
Towards public verifiable and forward-privacy encrypted search by using blockchain
Dynamic Searchable Symmetric Encryption (DSSE) is a practical cryptographic primitive that
assists servers to provide search and update functionalities in the ciphertext domain. Recent …
assists servers to provide search and update functionalities in the ciphertext domain. Recent …
Ryoan: A distributed sandbox for untrusted computation on secret data
Users of modern data-processing services such as tax preparation or genomic screening
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …
Generic attacks on secure outsourced databases
Recently, various protocols have been proposed for securely outsourcing database storage
to a third party server, ranging from systems with" full-fledged" security based on strong …
to a third party server, ranging from systems with" full-fledged" security based on strong …
Searchable symmetric encryption with forward search privacy
Searchable symmetric encryption (SSE) has been widely applied in the encrypted database
for queries in practice. Although SSE is powerful and feature-rich, it is always plagued by …
for queries in practice. Although SSE is powerful and feature-rich, it is always plagued by …