Database-as-a-service (DBaaS) allows the client to store and manage structured data on the cloud remotely. Despite its merits, DBaaS also brings significant privacy issues. Existing encryption techniques (e.g., SQL-aware encryption) can mitigate privacy concerns, but they still leak information through access patterns, which are vulnerable to statistical inference attacks. Oblivious Random Access Machine (ORAM) can seal such leakages; however, the recent studies showed significant challenges on the integration of ORAM into databases. That is, the direct usage of ORAM on databases is not only costly but also permits very limited query functionalities. In this paper, we propose new oblivious data structures called Oblivious Matrix Structure (...
www.oblivious-storage.com To understand the gap between theory and practice for obliv-ious cloud sto...
The rapid increase in the amount of data stored by cloud servers has resulted in growing privacy con...
In outsourced data services, revealing users’ data access pattern may lead to the exposure of a wide...
Graduation date: 2016The outsourcing of data storage and related infrastructure to third-party servi...
Cloud storage services are becoming more widely used in recent decades. Lots of systems can protect ...
We present a new oblivious RAM that supports variable-sized storage blocks (vORAM), which is the fir...
Remote storage of data has become an increasingly attractive and advantageous option, especially due...
As online storage services become increasingly common, it is important that users\u27 private inform...
A major algorithmic challenge in designing applications intended for secure remote execution is ensu...
Cloud computing allows customers to outsource the burden of data management and benefit from economy...
When multiple users and applications share the resources on cloud servers, information may be leaked...
Dynamic Searchable Symmetric Encryption (DSSE) allows to delegate search/update operations over encr...
Recent events have shown online service providers the perils of possessing private information about...
Oblivious RAM (ORAM) is important for applications that require hiding of access patterns. However, ...
Oblivious RAM (ORAM) is a tool proposed to hide access pattern leakage, and there has been a lot of ...
www.oblivious-storage.com To understand the gap between theory and practice for obliv-ious cloud sto...
The rapid increase in the amount of data stored by cloud servers has resulted in growing privacy con...
In outsourced data services, revealing users’ data access pattern may lead to the exposure of a wide...
Graduation date: 2016The outsourcing of data storage and related infrastructure to third-party servi...
Cloud storage services are becoming more widely used in recent decades. Lots of systems can protect ...
We present a new oblivious RAM that supports variable-sized storage blocks (vORAM), which is the fir...
Remote storage of data has become an increasingly attractive and advantageous option, especially due...
As online storage services become increasingly common, it is important that users\u27 private inform...
A major algorithmic challenge in designing applications intended for secure remote execution is ensu...
Cloud computing allows customers to outsource the burden of data management and benefit from economy...
When multiple users and applications share the resources on cloud servers, information may be leaked...
Dynamic Searchable Symmetric Encryption (DSSE) allows to delegate search/update operations over encr...
Recent events have shown online service providers the perils of possessing private information about...
Oblivious RAM (ORAM) is important for applications that require hiding of access patterns. However, ...
Oblivious RAM (ORAM) is a tool proposed to hide access pattern leakage, and there has been a lot of ...
www.oblivious-storage.com To understand the gap between theory and practice for obliv-ious cloud sto...
The rapid increase in the amount of data stored by cloud servers has resulted in growing privacy con...
In outsourced data services, revealing users’ data access pattern may lead to the exposure of a wide...