The state of public infrastructure-as-a-service cloud security

W Huang, A Ganjali, BH Kim, S Oh, D Lie - ACM Computing Surveys …, 2015 - dl.acm.org
The public Infrastructure-as-a-Service (IaaS) cloud industry has reached a critical mass in
the past few years, with many cloud service providers fielding competing services. Despite …

Cloud computing security: foundations and research directions

A Chakraborti, R Curtmola, J Katz… - … and Trends® in …, 2022 - nowpublishers.com
Cloud services have revolutionized modern computing. The benefits of outsourcing data and
computation come with security and privacy concerns. This monograph explores the …

Solidus: Confidential distributed ledger transactions via PVORM

E Cecchetti, F Zhang, Y Ji, A Kosba, A Juels… - Proceedings of the 2017 …, 2017 - dl.acm.org
Blockchains and more general distributed ledgers are becoming increasingly popular as
efficient, reliable, and persistent records of data and transactions. Unfortunately, they ensure …

Pancake: Frequency smoothing for encrypted data stores

P Grubbs, A Khandelwal, MS Lacharité… - 29th USENIX Security …, 2020 - usenix.org
We present PANCAKE, the first system to protect key-value stores from access pattern
leakage attacks with small constant factor bandwidth overhead. PANCAKE uses a new …

Coverless information hiding method based on the Chinese mathematical expression

X Chen, H Sun, Y Tobe, Z Zhou, X Sun - Cloud Computing and Security …, 2015 - Springer
Recently, many fruitful results have been presented in text information hiding such as text
format-based, text image-based method and so on. However, existing information hiding …

IO-DSSE: scaling dynamic searchable encryption to millions of indexes by improving locality

I Miers, P Mohassel - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Free cloud-based services are powerful candidates for deploying ubiquitous encryption for
messaging. In the case of email and increasingly chat, users expect the ability to store and …

Deftl: Implementing plausibly deniable encryption in flash translation layer

S Jia, L Xia, B Chen, P Liu - Proceedings of the 2017 ACM SIGSAC …, 2017 - dl.acm.org
Mobile devices today have been increasingly used to store and process sensitive
information. To protect sensitive data, mobile operating systems usually incorporate a …

Breach-resistant structured encryption

G Amjad, S Kamara, T Moataz - Cryptology ePrint Archive, 2018 - eprint.iacr.org
Motivated by the problem of data breaches, we formalize a notion of security for dynamic
structured encryption (STE) schemes that guarantees security against a snapshot adversary; …

HiPDS: A Storage Hardware-independent Plausibly Deniable Storage System

N Chen, B Chen - IEEE Transactions on Information Forensics …, 2023 - ieeexplore.ieee.org
A plausibly deniable storage (PDS) system not only conceals the plaintext of sensitive data,
but also hides their very existence. It can essentially mitigate a novel coercive attack, in …

INVISILINE: Invisible plausibly-deniable storage

SK Pinjala, B Carbunar, A Chakraborti… - 2024 IEEE symposium …, 2024 - ieeexplore.ieee.org
Plausibly-deniable (PD) storage systems allow users to securely hide data and plausibly
deny its presence when challenged by adversaries who coerce them to provide encryption …