Computation outsourcing to a cloud cluster has become a common practice in today’s world. Unlike traditional computing models, the cloud computing model has raised serious challenges in terms of privacy and integrity of the users’ sensitive data. Depending on their respective adversarial models, modern secure processor architectures offer a promising solution to many of these challenges. However, almost all secure processor proposals dealing with computation outsourcing face two crucial security vulnerabilities that are still treated as open problems; the threat of hardware Trojans embedded inside the secure processor chip, and, the threat of privacy leakage via access patterns of the secure processor to the untrusted memory. In order to de...
We are witnessing a confluence between applied cryptography and secure hardware systems in enabling ...
The all increasing need for data protection has given raise to a plethora of privacy preserving cry...
In outsourced data services, revealing users’ data access pattern may lead to the exposure of a wide...
Computation outsourcing to a cloud cluster has become a common practice in today’s world. Unlike tra...
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. On...
This paper considers encrypted computation where the user specifies encrypted inputs to an untrusted...
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One...
The rapid increase in the amount of data stored by cloud servers has resulted in growing privacy con...
When multiple users and applications share the resources on cloud servers, information may be leaked...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Oblivious RAM (ORAM) is an established cryptographic technique to hide a program's address pattern t...
The big data era has dramatically transformed our lives; however, security incidents such as data br...
Today, electronic devices have been widely deployed in our daily lives, basic infrastructure such as...
We present Blinded Memory (BliMe), a way to realize efficient and secure outsourced computation. Bli...
Cloud computing allows users to delegate data and computation to cloud service providers, at the co...
We are witnessing a confluence between applied cryptography and secure hardware systems in enabling ...
The all increasing need for data protection has given raise to a plethora of privacy preserving cry...
In outsourced data services, revealing users’ data access pattern may lead to the exposure of a wide...
Computation outsourcing to a cloud cluster has become a common practice in today’s world. Unlike tra...
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. On...
This paper considers encrypted computation where the user specifies encrypted inputs to an untrusted...
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One...
The rapid increase in the amount of data stored by cloud servers has resulted in growing privacy con...
When multiple users and applications share the resources on cloud servers, information may be leaked...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Oblivious RAM (ORAM) is an established cryptographic technique to hide a program's address pattern t...
The big data era has dramatically transformed our lives; however, security incidents such as data br...
Today, electronic devices have been widely deployed in our daily lives, basic infrastructure such as...
We present Blinded Memory (BliMe), a way to realize efficient and secure outsourced computation. Bli...
Cloud computing allows users to delegate data and computation to cloud service providers, at the co...
We are witnessing a confluence between applied cryptography and secure hardware systems in enabling ...
The all increasing need for data protection has given raise to a plethora of privacy preserving cry...
In outsourced data services, revealing users’ data access pattern may lead to the exposure of a wide...