A manifesto for future generation cloud computing: Research directions for the next decade

R Buyya, SN Srirama, G Casale, R Calheiros… - ACM computing …, 2018 - dl.acm.org
The Cloud computing paradigm has revolutionised the computer science horizon during the
past decade and has enabled the emergence of computing as the fifth utility. It has captured …

Oblivious {Multi-Party} machine learning on trusted processors

O Ohrimenko, F Schuster, C Fournet, A Mehta… - 25th USENIX Security …, 2016 - usenix.org
Privacy-preserving multi-party machine learning allows multiple organizations to perform
collaborative data analytics while guaranteeing the privacy of their individual datasets …

Opaque: An oblivious and encrypted distributed analytics platform

W Zheng, A Dave, JG Beekman, RA Popa… - … USENIX Symposium on …, 2017 - usenix.org
Many systems run rich analytics on sensitive data in the cloud, but are prone to data
breaches. Hardware enclaves promise data confidentiality and secure execution of arbitrary …

Inference attacks on property-preserving encrypted databases

M Naveed, S Kamara, CV Wright - Proceedings of the 22nd ACM …, 2015 - dl.acm.org
Many encrypted database (EDB) systems have been proposed in the last few years as cloud
computing has grown in popularity and data breaches have increased. The state-of-the-art …

Shielding applications from an untrusted cloud with haven

A Baumann, M Peinado, G Hunt - ACM Transactions on Computer …, 2015 - dl.acm.org
Today's cloud computing infrastructure requires substantial trust. Cloud users rely on both
the provider's staff and its globally distributed software/hardware platform not to expose any …

VC3: Trustworthy data analytics in the cloud using SGX

F Schuster, M Costa, C Fournet… - … IEEE symposium on …, 2015 - ieeexplore.ieee.org
We present VC3, the first system that allows users to run distributed MapReduce
computations in the cloud while keeping their code and data secret, and ensuring the …

Generic attacks on secure outsourced databases

G Kellaris, G Kollios, K Nissim, A O'neill - Proceedings of the 2016 ACM …, 2016 - dl.acm.org
Recently, various protocols have been proposed for securely outsourcing database storage
to a third party server, ranging from systems with" full-fledged" security based on strong …

Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities

JI Choi, KRB Butler - Security and Communication Networks, 2019 - Wiley Online Library
When two or more parties need to compute a common result while safeguarding their
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …

{zkLedger}:{Privacy-Preserving} auditing for distributed ledgers

N Narula, W Vasquez, M Virza - 15th USENIX symposium on networked …, 2018 - usenix.org
Distributed ledgers (eg blockchains) enable financial institutions to efficiently reconcile cross-
organization transactions. For example, banks might use a distributed ledger as a settlement …

Processing analytical queries over encrypted data

SL Tu, MF Kaashoek, SR Madden, N Zeldovich - 2013 - dspace.mit.edu
MONOMI is a system for securely executing analytical workloads over sensitive data on an
untrusted database server. MONOMI works by encrypting the entire database and running …