Recent events have shown online service providers the perils of possessing private information about users. Encrypting data mitigates but does not eliminate this threat: the pattern of data accesses still reveals information. Thus, we present Shroud, a general storage system that hides data access patterns from the servers running it, protecting user privacy. Shroud functions as a virtual disk with a new privacy guarantee: the user can look up a block without revealing the block\u27s address. Such a virtual disk can be used for many purposes, including map lookup, microblog search, and social networking. Shroud aggressively targets hiding accesses among hundreds of terabytes of data. We achieve our goals by adapting oblivious RAM (ORAM) al...
Oblivious RAM (ORAM) is important for applications that require hiding access patterns. Many ORAM sc...
In outsourced data services, revealing users’ data access pattern may lead to the exposure of a wide...
Oblivious RAM (ORAM) and private information retrieval (PIR) are classic cryptographic primitives us...
When multiple users and applications share the resources on cloud servers, information may be leaked...
Cloud computing allows customers to outsource the burden of data management and benefit from economy...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
With the recent popularity of outsourcing private data to the cloud, there is an increased interest ...
Cloud storage services are becoming more widely used in recent decades. Lots of systems can protect ...
We present a new oblivious RAM that supports variable-sized storage blocks (vORAM), which is the fir...
The rapid increase in the amount of data stored by cloud servers has resulted in growing privacy con...
Remote storage of data has become an increasingly attractive and advantageous option, especially due...
The all increasing need for data protection has given raise to a plethora of privacy preserving cry...
We formalize the notion of Verifiable Oblivious Storage (VOS), where a client outsources the storage...
Part 2: Security of DataInternational audienceTo fully benefit from a cloud storage approach, privac...
Graduation date: 2016The outsourcing of data storage and related infrastructure to third-party servi...
Oblivious RAM (ORAM) is important for applications that require hiding access patterns. Many ORAM sc...
In outsourced data services, revealing users’ data access pattern may lead to the exposure of a wide...
Oblivious RAM (ORAM) and private information retrieval (PIR) are classic cryptographic primitives us...
When multiple users and applications share the resources on cloud servers, information may be leaked...
Cloud computing allows customers to outsource the burden of data management and benefit from economy...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
With the recent popularity of outsourcing private data to the cloud, there is an increased interest ...
Cloud storage services are becoming more widely used in recent decades. Lots of systems can protect ...
We present a new oblivious RAM that supports variable-sized storage blocks (vORAM), which is the fir...
The rapid increase in the amount of data stored by cloud servers has resulted in growing privacy con...
Remote storage of data has become an increasingly attractive and advantageous option, especially due...
The all increasing need for data protection has given raise to a plethora of privacy preserving cry...
We formalize the notion of Verifiable Oblivious Storage (VOS), where a client outsources the storage...
Part 2: Security of DataInternational audienceTo fully benefit from a cloud storage approach, privac...
Graduation date: 2016The outsourcing of data storage and related infrastructure to third-party servi...
Oblivious RAM (ORAM) is important for applications that require hiding access patterns. Many ORAM sc...
In outsourced data services, revealing users’ data access pattern may lead to the exposure of a wide...
Oblivious RAM (ORAM) and private information retrieval (PIR) are classic cryptographic primitives us...