Data protection in AI services: A survey

C Meurisch, M Mühlhäuser - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Advances in artificial intelligence (AI) have shaped today's user services, enabling
enhanced personalization and better support. As such AI-based services inevitably require …

Serverless computing: One step forward, two steps back

JM Hellerstein, J Faleiro, JE Gonzalez… - arXiv preprint arXiv …, 2018 - arxiv.org
Serverless computing offers the potential to program the cloud in an autoscaling, pay-as-you
go manner. In this paper we address critical gaps in first-generation serverless computing …

Untangling blockchain: A data processing view of blockchain systems

TTA Dinh, R Liu, M Zhang, G Chen… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Blockchain technologies are gaining massive momentum in the last few years. Blockchains
are distributed ledgers that enable parties who do not fully trust each other to maintain a set …

A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018 - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

{SkyPilot}: An intercloud broker for sky computing

Z Yang, Z Wu, M Luo, WL Chiang, R Bhardwaj… - … USENIX Symposium on …, 2023 - usenix.org
To comply with the increasing number of government regulations about data placement and
processing, and to protect themselves against major cloud outages, many users want the …

Privacy preserving vertical federated learning for tree-based models

Y Wu, S Cai, X Xiao, G Chen, BC Ooi - arXiv preprint arXiv:2008.06170, 2020 - arxiv.org
Federated learning (FL) is an emerging paradigm that enables multiple organizations to
jointly train a model without revealing their private data to each other. This paper studies {\it …

Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts

R Cheng, F Zhang, J Kos, W He… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Smart contracts are applications that execute on blockchains. Today they manage billions of
dollars in value and motivate visionary plans for pervasive blockchain deployment. While …

{Graphene-SGX}: A practical library {OS} for unmodified applications on {SGX}

CC Tsai, DE Porter, M Vij - 2017 USENIX Annual Technical Conference …, 2017 - usenix.org
Intel SGX hardware enables applications to protect themselves from potentially-malicious
OSes or hypervisors. In cloud computing and other systems, many users and applications …

Sgxpectre: Stealing intel secrets from sgx enclaves via speculative execution

G Chen, S Chen, Y Xiao, Y Zhang… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Speculative execution side-channel vulnerabilities in micro-architecture processors have
raised concerns about the security of Intel SGX. To understand clearly the security impact of …

Prochlo: Strong privacy for analytics in the crowd

A Bittau, Ú Erlingsson, P Maniatis, I Mironov… - Proceedings of the 26th …, 2017 - dl.acm.org
The large-scale monitoring of computer users' software activities has become commonplace,
eg, for application telemetry, error reporting, or demographic profiling. This paper describes …