Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms

N Kaaniche, M Laurent - Computer Communications, 2017 - Elsevier
Recent technological advances have sparked the popularity and success of cloud. This new
paradigm is gaining an expanding interest, since it provides cost efficient architectures that …

Ensuring security and privacy preservation for cloud data services

J Tang, Y Cui, Q Li, K Ren, J Liu, R Buyya - ACM Computing Surveys …, 2016 - dl.acm.org
With the rapid development of cloud computing, more and more enterprises/individuals are
starting to outsource local data to the cloud servers. However, under open networks and not …

Path ORAM: an extremely simple oblivious RAM protocol

E Stefanov, M Dijk, E Shi, THH Chan… - Journal of the ACM …, 2018 - dl.acm.org
We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …

Piano: extremely simple, single-server PIR with sublinear server computation

M Zhou, A Park, W Zheng, E Shi - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
We construct a sublinear-time single-server preprocessing Private Information Retrieval
(PIR) scheme with an optimal tradeoff between client storage and server computation (up to …

Auditing cache data integrity in the edge computing environment

B Li, Q He, F Chen, H **, Y **ang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Edge computing allows app vendors to deploy their applications and relevant data on
distributed edge servers to serve nearby users. Caching data on edge servers can minimize …

Dynamic provable data possession

CC Erway, A Küpçü, C Papamanthou… - ACM Transactions on …, 2015 - dl.acm.org
As storage-outsourcing services and resource-sharing networks have become popular, the
problem of efficiently proving the integrity of data stored at untrusted servers has received …

Permacoin: Repurposing bitcoin work for data preservation

A Miller, A Juels, E Shi, B Parno… - 2014 IEEE Symposium …, 2014 - ieeexplore.ieee.org
Bit coin is widely regarded as the first broadly successful e-cash system. An oft-cited
concern, though, is that mining Bit coins wastes computational resources. Indeed, Bit coin's …

External integrity verification for outsourced big data in cloud and IoT: A big picture

C Liu, C Yang, X Zhang, J Chen - Future generation computer systems, 2015 - Elsevier
As cloud computing is being widely adopted for big data processing, data security is
becoming one of the major concerns of data owners. Data integrity is an important factor in …

MuR-DPA: Top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud

C Liu, R Ranjan, C Yang, X Zhang… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Cloud computing that provides elastic computing and storage resource on demand has
become increasingly important due to the emergence of “big data”. Cloud computing …

Private blocklist lookups with checklist

D Kogan, H Corrigan-Gibbs - 30th USENIX security symposium (USENIX …, 2021 - usenix.org
This paper presents Checklist, a system for private blocklist lookups. In Checklist, a client
can determine whether a particular string appears on a server-held blocklist of strings …