In outsourced data services, revealing users’ data access pattern may lead to the exposure of a wide range of sensitive information even if data is encrypted. Oblivious RAM has been a well-studied provable solution to access pattern preservation. However, it is not resilient to attacks towards data integrity from the users or the server. In this paper, we study the problem of protecting access pattern privacy and data integrity together in outsourced data services, and propose a scheme that introduces accountability support into a hash-based ORAM design. The proposed scheme can detect misconduct committed by malicious users or server, and identify the attacker, while not interfering with the access pattern preservation mechanisms inherent f...
In the past few years, outsourcing private data to untrusted servers has become an important challen...
Computation outsourcing to a cloud cluster has become a common practice in today’s world. Unlike tra...
Oblivious RAM (ORAM) is important for applications that require hiding access patterns. Many ORAM sc...
In cloud storage services, a wide range of sensitive information may be leaked to the host server vi...
Outsourcing data to remote storage servers has become more and more popular, but the related securit...
Cloud storage services are becoming more widely used in recent decades. Lots of systems can protect ...
When multiple users and applications share the resources on cloud servers, information may be leaked...
Cloud computing allows customers to outsource the burden of data management and benefit from economy...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
As outsourcing data to remote storage servers gets popular, protecting user’s pattern in accessing t...
Recent events have shown online service providers the perils of possessing private information about...
With the recent popularity of outsourcing private data to the cloud, there is an increased interest ...
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. On...
The all increasing need for data protection has given raise to a plethora of privacy preserving cry...
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One...
In the past few years, outsourcing private data to untrusted servers has become an important challen...
Computation outsourcing to a cloud cluster has become a common practice in today’s world. Unlike tra...
Oblivious RAM (ORAM) is important for applications that require hiding access patterns. Many ORAM sc...
In cloud storage services, a wide range of sensitive information may be leaked to the host server vi...
Outsourcing data to remote storage servers has become more and more popular, but the related securit...
Cloud storage services are becoming more widely used in recent decades. Lots of systems can protect ...
When multiple users and applications share the resources on cloud servers, information may be leaked...
Cloud computing allows customers to outsource the burden of data management and benefit from economy...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
As outsourcing data to remote storage servers gets popular, protecting user’s pattern in accessing t...
Recent events have shown online service providers the perils of possessing private information about...
With the recent popularity of outsourcing private data to the cloud, there is an increased interest ...
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. On...
The all increasing need for data protection has given raise to a plethora of privacy preserving cry...
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One...
In the past few years, outsourcing private data to untrusted servers has become an important challen...
Computation outsourcing to a cloud cluster has become a common practice in today’s world. Unlike tra...
Oblivious RAM (ORAM) is important for applications that require hiding access patterns. Many ORAM sc...