Data mining with big data

X Wu, X Zhu, GQ Wu, W Ding - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Big Data concern large-volume, complex, growing data sets with multiple, autonomous
sources. With the fast development of networking, data storage, and the data collection …

Path ORAM: an extremely simple oblivious RAM protocol

E Stefanov, M Dijk, E Shi, THH Chan… - Journal of the ACM …, 2018 - dl.acm.org
We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …

Oblix: An efficient oblivious search index

P Mishra, R Poddar, J Chen, A Chiesa… - 2018 IEEE symposium …, 2018 - ieeexplore.ieee.org
Search indices are fundamental building blocks of many systems, and there is great interest
in running them on encrypted data. Unfortunately, many known schemes that enable search …

Circuit oram: On tightness of the goldreich-ostrovsky lower bound

X Wang, H Chan, E Shi - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
We propose a new tree-based ORAM scheme called Circuit ORAM. Circuit ORAM makes
both theoretical and practical contributions. From a theoretical perspective, Circuit ORAM …

Revisiting leakage abuse attacks

L Blackstone, S Kamara, T Moataz - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Encrypted search algorithms (ESA) are cryptographic algorithms that support search over
encrypted data. ESAs can be designed with various primitives including …

Oblivistore: High performance oblivious cloud storage

E Stefanov, E Shi - 2013 IEEE Symposium on Security and …, 2013 - ieeexplore.ieee.org
We design and build ObliviStore, a high performance, distributed ORAM-based cloud data
store secure in the malicious model. To the best of our knowledge, ObliviStore is the fastest …

Constants count: Practical improvements to oblivious {RAM}

L Ren, C Fletcher, A Kwon, E Stefanov, E Shi… - 24th USENIX Security …, 2015 - usenix.org
Oblivious RAM (ORAM) is a cryptographic primitive that hides memory access patterns as
seen by untrusted storage. This paper proposes Ring ORAM, the most bandwidth-efficient …

Ghostrider: A hardware-software system for memory trace oblivious computation

C Liu, A Harris, M Maas, M Hicks, M Tiwari… - ACM SIGPLAN …, 2015 - dl.acm.org
This paper presents a new, co-designed compiler and architecture called GhostRider for
supporting privacy preserving computation in the cloud. GhostRider ensures all programs …

Phantom: Practical oblivious computation in a secure processor

M Maas, E Love, E Stefanov, M Tiwari, E Shi… - Proceedings of the …, 2013 - dl.acm.org
We introduce PHANTOM [1] a new secure processor that obfuscates its memory access
trace. To an adversary who can observe the processor's output pins, all memory access …

Onion ORAM: A constant bandwidth blowup oblivious RAM

S Devadas, M van Dijk, CW Fletcher, L Ren… - Theory of Cryptography …, 2016 - Springer
We present Onion ORAM, an Oblivious RAM (ORAM) with constant worst-case bandwidth
blowup that leverages poly-logarithmic server computation to circumvent the logarithmic …