www.oblivious-storage.com To understand the gap between theory and practice for obliv-ious cloud storage, we experimentally evaluate four repre-sentative Oblivious RAM (ORAM) designs on Amazon S3. We replay realistic application traces to these ORAMs in order to understand whether they can meet the demands of various real applications using cloud storage as a backend. We find that metrics traditionally used in the ORAM litera-ture, e.g., bandwidth overhead, fail to capture the practical needs of those applications. With a new understanding of the desirable properties, relevant metrics, and observations about the cloud services and their applications, we propose CURIOUS, a new modular partition-based ORAM frame-work, and show experimentally ...
We are among the first to systematically investigate (memory-trace) oblivious data struc-tures. We p...
We formalize the notion of Verifiable Oblivious Storage (VOS), where a client outsources the storage...
Outsourcing data to remote storage servers has become more and more popular, but the related securit...
Cloud storage services are becoming more widely used in recent decades. Lots of systems can protect ...
Remote storage of data has become an increasingly attractive and advantageous option, especially due...
We present a 2-cloud oblivious storage (ORAM) system that achieves 2.6X bandwidth cost between the c...
Oblivious RAM simulation is a method for achieving confidentiality and privacy in cloud computing en...
Oblivious RAM (ORAM) is important for applications that require hiding of access patterns. However, ...
Database-as-a-service (DBaaS) allows the client to store and manage structured data on the cloud rem...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
When multiple users and applications share the resources on cloud servers, information may be leaked...
Graduation date: 2016The outsourcing of data storage and related infrastructure to third-party servi...
We study oblivious storage (OS), a natural way to model privacy-preserving data outsourcing where a ...
Abstract. Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely ac...
As online storage services become increasingly common, it is important that users\u27 private inform...
We are among the first to systematically investigate (memory-trace) oblivious data struc-tures. We p...
We formalize the notion of Verifiable Oblivious Storage (VOS), where a client outsources the storage...
Outsourcing data to remote storage servers has become more and more popular, but the related securit...
Cloud storage services are becoming more widely used in recent decades. Lots of systems can protect ...
Remote storage of data has become an increasingly attractive and advantageous option, especially due...
We present a 2-cloud oblivious storage (ORAM) system that achieves 2.6X bandwidth cost between the c...
Oblivious RAM simulation is a method for achieving confidentiality and privacy in cloud computing en...
Oblivious RAM (ORAM) is important for applications that require hiding of access patterns. However, ...
Database-as-a-service (DBaaS) allows the client to store and manage structured data on the cloud rem...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
When multiple users and applications share the resources on cloud servers, information may be leaked...
Graduation date: 2016The outsourcing of data storage and related infrastructure to third-party servi...
We study oblivious storage (OS), a natural way to model privacy-preserving data outsourcing where a ...
Abstract. Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely ac...
As online storage services become increasingly common, it is important that users\u27 private inform...
We are among the first to systematically investigate (memory-trace) oblivious data struc-tures. We p...
We formalize the notion of Verifiable Oblivious Storage (VOS), where a client outsources the storage...
Outsourcing data to remote storage servers has become more and more popular, but the related securit...