A systematic literature review of empirical methods and risk representation in usable privacy and security research
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …
represent risk to research participants. To understand how these approaches are used and …
Hiding the access pattern is not enough: Exploiting search pattern leakage in searchable encryption
Recent Searchable Symmetric Encryption (SSE) schemes enable secure searching over an
encrypted database stored in a server while limiting the information leaked to the server …
encrypted database stored in a server while limiting the information leaked to the server …
Improved reconstruction attacks on encrypted data using range query leakage
MS Lacharité, B Minaud… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
We analyse the security of database encryption schemes supporting range queries against
persistent adversaries. The bulk of our work applies to a generic setting, where the …
persistent adversaries. The bulk of our work applies to a generic setting, where the …
Private web search with Tiptoe
Tiptoe is a private web search engine that allows clients to search over hundreds of millions
of documents, while revealing no information about their search query to the search engine's …
of documents, while revealing no information about their search query to the search engine's …
Waldo: A private time-series database from function secret sharing
Applications today rely on cloud databases for storing and querying time-series data. While
outsourcing storage is convenient, this data is often sensitive, making data breaches a …
outsourcing storage is convenient, this data is often sensitive, making data breaches a …
Conclave: secure multi-party computation on big data
Secure Multi-Party Computation (MPC) allows mutually distrusting parties to run joint
computations without revealing private data. Current MPC algorithms scale poorly with data …
computations without revealing private data. Current MPC algorithms scale poorly with data …
Cloud computing security: foundations and research directions
Cloud services have revolutionized modern computing. The benefits of outsourcing data and
computation come with security and privacy concerns. This monograph explores the …
computation come with security and privacy concerns. This monograph explores the …
StealthDB: a scalable encrypted database with full SQL query support
D Vinayagamurthy, A Gribov… - Proceedings on Privacy …, 2019 - petsymposium.org
Encrypted database systems provide a great method for protecting sensitive data in
untrusted infrastructures. These systems are built using either specialpurpose cryptographic …
untrusted infrastructures. These systems are built using either specialpurpose cryptographic …
Oblidb: Oblivious query processing for secure databases
Hardware enclaves such as Intel SGX are a promising technology for improving the security
of databases outsourced to the cloud. These enclaves provide an execution environment …
of databases outsourced to the cloud. These enclaves provide an execution environment …
The state of the uniform: Attacks on encrypted databases beyond the uniform query distribution
Recent foundational work on leakage-abuse attacks on encrypted databases has
broadened our understanding of what an adversary can accomplish with a standard leakage …
broadened our understanding of what an adversary can accomplish with a standard leakage …