Towards practical oblivious join

Z Chang, D Xie, S Wang, F Li - … of the 2022 International Conference on …, 2022 - dl.acm.org
Many individuals and companies choose the public cloud as their data and IT infrastructure
platform. But remote accesses over the data inevitably bring the issue of trust. Despite strong …

Efficient oblivious query processing for range and knn queries

Z Chang, D Xie, F Li, JM Phillips… - … on Knowledge and …, 2021 - ieeexplore.ieee.org
Increasingly, individuals and companies adopt a cloud service provider as a primary data
and IT infrastructure platform. The remote access of the data inevitably brings the issue of …

Oblivious RAM: A dissection and experimental evaluation

Z Chang, D Xie, F Li - Proceedings of the VLDB Endowment, 2016 - dl.acm.org
Many companies choose the cloud as their data and IT infrastructure platform. The remote
access of the data brings the issue of trust. Despite the use of strong encryption schemes …

Efficient oblivious database joins

S Krastnikov, F Kerschbaum, D Stebila - arXiv preprint arXiv:2003.09481, 2020 - arxiv.org
A major algorithmic challenge in designing applications intended for secure remote
execution is ensuring that they are oblivious to their inputs, in the sense that their memory …

Efficient oblivious data structures for database services on the cloud

T Hoang, CD Ozkaptan, G Hackebeil… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Database-as-a-service (DBaaS) allows the client to store and manage structured data on the
cloud remotely. Despite its merits, DBaaS also brings significant privacy issues. Existing …

Oblidb: Oblivious query processing for secure databases

S Eskandarian, M Zaharia - arXiv preprint arXiv:1710.00458, 2017 - arxiv.org
Hardware enclaves such as Intel SGX are a promising technology for improving the security
of databases outsourced to the cloud. These enclaves provide an execution environment …

Differentially oblivious database joins: Overcoming the worst-case curse of fully oblivious algorithms

S Chu, D Zhuo, E Shi, THH Chan - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Numerous high-profile works have shown that access patterns to even encrypted databases
can leak secret information and sometimes even lead to reconstruction of the entire …

A practical oblivious map data structure with secure deletion and history independence

DS Roche, A Aviv, SG Choi - 2016 IEEE Symposium on …, 2016 - ieeexplore.ieee.org
We present a new oblivious RAM that supports variable-sized storage blocks (vORAM),
which is the first ORAM to allow varying block sizes without trivial padding. We also present …

An efficient oblivious random data access scheme in cloud computing

H Liu, X Lu, S Duan, Y Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the development of cloud computing and cloud storage techniques, much attention has
been focused on the privacy protection of outsourced data. Existing searchable encryption …

Poster: Panacea---Stateless and Non-Interactive Oblivious RAM

K Cong, D Das, G Nicolas, J Park - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
Oblivious RAM (ORAM) allows a client to outsource database storage to a remote server
while hiding the data access pattern. Existing designs use non-linear data structures (eg …