A manifesto for future generation cloud computing: Research directions for the next decade

R Buyya, SN Srirama, G Casale, R Calheiros… - ACM computing …, 2018 - dl.acm.org
The Cloud computing paradigm has revolutionised the computer science horizon during the
past decade and has enabled the emergence of computing as the fifth utility. It has captured …

Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges

J Domingo-Ferrer, O Farras, J Ribes-González… - Computer …, 2019 - Elsevier
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …

Label-only membership inference attacks

CA Choquette-Choo, F Tramer… - International …, 2021 - proceedings.mlr.press
Membership inference is one of the simplest privacy threats faced by machine learning
models that are trained on private sensitive data. In this attack, an adversary infers whether a …

A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018 - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

Inferring fine-grained control flow inside {SGX} enclaves with branch shadowing

S Lee, MW Shih, P Gera, T Kim, H Kim… - 26th USENIX Security …, 2017 - usenix.org
Intel has introduced a hardware-based trusted execution environment, Intel Software Guard
Extensions (SGX), that provides a secure, isolated execution environment, or enclave, for a …

EnclaveDB: A secure database using SGX

C Priebe, K Vaswani, M Costa - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
We propose EnclaveDB, a database engine that guarantees confidentiality, integrity, and
freshness for data and queries. EnclaveDB guarantees these properties even when the …

Towards public verifiable and forward-privacy encrypted search by using blockchain

Y Guo, C Zhang, C Wang, X Jia - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Dynamic Searchable Symmetric Encryption (DSSE) is a practical cryptographic primitive that
assists servers to provide search and update functionalities in the ciphertext domain. Recent …

Ryoan: A distributed sandbox for untrusted computation on secret data

T Hunt, Z Zhu, Y Xu, S Peter, E Witchel - ACM Transactions on Computer …, 2018 - dl.acm.org
Users of modern data-processing services such as tax preparation or genomic screening
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …

Generic attacks on secure outsourced databases

G Kellaris, G Kollios, K Nissim, A O'neill - Proceedings of the 2016 ACM …, 2016 - dl.acm.org
Recently, various protocols have been proposed for securely outsourcing database storage
to a third party server, ranging from systems with" full-fledged" security based on strong …

Searchable symmetric encryption with forward search privacy

J Li, Y Huang, Y Wei, S Lv, Z Liu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Searchable symmetric encryption (SSE) has been widely applied in the encrypted database
for queries in practice. Although SSE is powerful and feature-rich, it is always plagued by …