Cloud computing security: foundations and research directions

A Chakraborti, R Curtmola, J Katz… - … and Trends® in …, 2022 - nowpublishers.com
Cloud services have revolutionized modern computing. The benefits of outsourcing data and
computation come with security and privacy concerns. This monograph explores the …

{DORY}: An encrypted search system with distributed trust

E Dauterman, E Feng, E Luo, RA Popa… - 14th USENIX Symposium …, 2020 - usenix.org
Efficient, leakage-free search on encrypted data has remained an unsolved problem for the
last two decades; efficient schemes are vulnerable to leakage-abuse attacks, and schemes …

Ghostor: Toward a Secure {Data-Sharing} System from Decentralized Trust

Y Hu, S Kumar, RA Popa - 17th USENIX Symposium on Networked …, 2020 - usenix.org
Data-sharing systems are often used to store sensitive data. Both academia and industry
have proposed numerous solutions to protect the user privacy and data integrity from a …

Metal: A metadata-hiding file-sharing system

W Chen, RA Popa - NDSS Symposium 2020, 2020 - par.nsf.gov
File-sharing systems like Dropbox offer insufficient privacy because a compromised server
can see the file contents in the clear. Although encryption can hide such contents from the …

Cross-domain access control encryption: Arbitrary-policy, constant-size, efficient

X Wang, SSM Chow - 2021 IEEE Symposium on Security and …, 2021 - ieeexplore.ieee.org
Access control is a fundamental keystone in security. Damgard, Haagh, and Orlandi (TCC
2016) introduced access˚ control encryption (ACE) that enforces no-read and no-write rules …

Titanium: A metadata-hiding file-sharing system with malicious security

W Chen, T Hoang, J Guajardo, AA Yavuz - Network and Distributed …, 2022 - par.nsf.gov
End-to-end encrypted file-sharing systems enable users to share files without revealing the
file contents to the storage servers. However, the servers still learn metadata, including user …

Fighting fake news in encrypted messaging with the fuzzy anonymous complaint tally system (facts)

L Liu, DS Roche, A Theriault… - arXiv preprint arXiv …, 2021 - arxiv.org
Recent years have seen a strong uptick in both the prevalence and real-world
consequences of false information spread through online platforms. At the same time …

MOSE: Practical multi-user oblivious storage via secure enclaves

T Hoang, R Behnia, Y Jang, AA Yavuz - Proceedings of the Tenth ACM …, 2020 - dl.acm.org
Multi-user oblivious storage allows users to access their shared data on the cloud while
retaining access pattern obliviousness and data confidentiality simultaneously. Most secure …

MacORAMa: Optimal oblivious RAM with integrity

S Mathialagan, N Vafa - Annual International Cryptology Conference, 2023 - Springer
Oblivious RAM (ORAM), introduced by Goldreich and Ostrovsky (J. ACM '96), is a primitive
that allows a client to perform RAM computations on an external database without revealing …

Vizard: A metadata-hiding data analytic system with end-to-end policy controls

C Cai, Y Zang, C Wang, X Jia, Q Wang - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Owner-centric control is a widely adopted method for easing owners' concerns over data
abuses and motivating them to share their data out to gain collective knowledge. However …