{SEAL}: Attack mitigation for encrypted databases via adjustable leakage

I Demertzis, D Papadopoulos, C Papamanthou… - 29th USENIX security …, 2020 - usenix.org
Building expressive encrypted databases that can scale to large volumes of data while
enjoying formal security guarantees has been one of the holy grails of security and …

The state of the uniform: Attacks on encrypted databases beyond the uniform query distribution

EM Kornaropoulos, C Papamanthou… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Recent foundational work on leakage-abuse attacks on encrypted databases has
broadened our understanding of what an adversary can accomplish with a standard leakage …

Protocols for checking compromised credentials

L Li, B Pal, J Ali, N Sullivan, R Chatterjee… - Proceedings of the …, 2019 - dl.acm.org
To prevent credential stuffing attacks, industry best practice now proactively checks if user
credentials are present in known data breaches. Recently, some web services, such as …

Balancing storage efficiency and data confidentiality with tunable encrypted deduplication

J Li, Z Yang, Y Ren, PPC Lee, X Zhang - Proceedings of the Fifteenth …, 2020 - dl.acm.org
Conventional encrypted deduplication approaches retain the deduplication capability on
duplicate chunks after encryption by always deriving the key for encryption/decryption from …

Waffle: An online oblivious datastore for protecting data access patterns

S Maiyya, SC Vemula, D Agrawal, A El Abbadi… - Proceedings of the …, 2023 - dl.acm.org
We present Waffle, a datastore that protects an application's data access patterns from a
passive persistent adversary. Waffle achieves this without prior knowledge of the input data …

{SHORTSTACK}: Distributed, Fault-tolerant, Oblivious Data Access

M Vuppalapati, K Babel, A Khandelwal… - 16th USENIX Symposium …, 2022 - usenix.org
Many applications that benefit from data offload to cloud services operate on private data. A
now-long line of work has shown that, even when data is offloaded in an encrypted form, an …

Frequency-hiding order-preserving encryption with small client storage

D Li, S Lv, Y Huang, Y Liu, T Li, Z Liu… - Proceedings of the VLDB …, 2021 - dl.acm.org
The range query on encrypted databases is usually implemented using the order-preserving
encryption (OPE) technique which preserves the order of plaintexts. Since the frequency …

Security-aware and efficient data deduplication for edge-assisted cloud storage systems

Q Xie, C Zhang, X Jia - IEEE Transactions on Services …, 2022 - ieeexplore.ieee.org
Data deduplication at the network edge significantly improves communication efficiency in
edge-assisted cloud storage systems. With the increasing concern about data privacy …

Revisiting frequency analysis against encrypted deduplication via statistical distribution

J Li, G Wei, J Liang, Y Ren, PPC Lee… - IEEE INFOCOM 2022 …, 2022 - ieeexplore.ieee.org
Encrypted deduplication addresses both security and storage efficiency in large-scale
storage systems: it ensures that each plaintext is encrypted to a ciphertext by a symmetric …

Enabling secure intelligent network with cloud-assisted privacy-preserving machine learning

Y Yu, H Li, R Chen, Y Zhao, H Yang, X Du - IEEE Network, 2019 - ieeexplore.ieee.org
Intelligent networks are regarded as existing networks incorporating some intelligent
mechanisms such as cognitive and cooperative approaches to improve network …