Oblivious RAM (ORAM) is a tool proposed to hide access pattern leakage, and there has been a lot of progress in the efficiency of ORAM schemes; however, less attention has been paid to study the applicability of ORAM for cloud applications such as symmetric searchable encryption (SSE). Although, searchable encryption is one of the motivations for ORAM research, no in-depth study of the applicability of ORAM to searchable encryption exists as of June 2015. In this work, we initiate the formal study of using ORAM to reduce the access pattern leakage in searchable encryption. We propose four new leakage classes and develop a systematic methodology to study the applicability of ORAM to SSE. We de-velop a worst-case communication baseline for SS...
International audienceExisting Oblivious RAM protocols do not support the storage of data items of v...
Oblivious RAM (ORAM) is an established cryptographic technique to hide a program's address pattern t...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Oblivious RAM (ORAM) is a tool proposed to hide access pattern leakage, and there has been a lot of ...
With the recent popularity of outsourcing private data to the cloud, there is an increased interest ...
Searching on remote encrypted data (commonly known as searchable encryption) has become an important...
Searching on remote encrypted data (commonly known as searchable en-cryption) has become an importan...
The advent of cloud computing has ushered in an era of mass data storage in remote servers. Remote d...
Graduation date: 2016The outsourcing of data storage and related infrastructure to third-party servi...
Abstract. We presentTWORAM, the first efficient round-optimal oblivious RAM (ORAM) scheme. TWORAM pr...
Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query encrypted data ...
Dynamic Searchable Symmetric Encryption (DSSE) allows search/update operations over encrypted data v...
Dynamic Searchable Symmetric Encryption (DSSE) allows to delegate search/update operations over encr...
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One...
Structured encryption (STE) schemes encrypt data structures in such a way that they can be privately...
International audienceExisting Oblivious RAM protocols do not support the storage of data items of v...
Oblivious RAM (ORAM) is an established cryptographic technique to hide a program's address pattern t...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Oblivious RAM (ORAM) is a tool proposed to hide access pattern leakage, and there has been a lot of ...
With the recent popularity of outsourcing private data to the cloud, there is an increased interest ...
Searching on remote encrypted data (commonly known as searchable encryption) has become an important...
Searching on remote encrypted data (commonly known as searchable en-cryption) has become an importan...
The advent of cloud computing has ushered in an era of mass data storage in remote servers. Remote d...
Graduation date: 2016The outsourcing of data storage and related infrastructure to third-party servi...
Abstract. We presentTWORAM, the first efficient round-optimal oblivious RAM (ORAM) scheme. TWORAM pr...
Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query encrypted data ...
Dynamic Searchable Symmetric Encryption (DSSE) allows search/update operations over encrypted data v...
Dynamic Searchable Symmetric Encryption (DSSE) allows to delegate search/update operations over encr...
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One...
Structured encryption (STE) schemes encrypt data structures in such a way that they can be privately...
International audienceExisting Oblivious RAM protocols do not support the storage of data items of v...
Oblivious RAM (ORAM) is an established cryptographic technique to hide a program's address pattern t...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...