Blockchains and more general distributed ledgers are becoming increasingly popular as efficient, reliable, and persistent records of data and transactions. Unfortunately, they ensure …
K Gai, M Qiu, H Zhao - IEEE Transactions on Big Data, 2017 - ieeexplore.ieee.org
Privacy has become a considerable issue when the applications of big data are dramatically growing in cloud computing. The benefits of the implementation for these emerging …
E Dauterman, E Feng, E Luo, RA Popa… - 14th USENIX Symposium …, 2020 - usenix.org
Efficient, leakage-free search on encrypted data has remained an unsolved problem for the last two decades; efficient schemes are vulnerable to leakage-abuse attacks, and schemes …
D Yuan, Q Li, G Li, Q Wang… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Privacy leakage is a serious issue in spatial crowdsourcing in various scenarios. In this paper, we study privacy protection in spatial crowdsourcing. The main challenge is to …
We consider oblivious storage systems hiding both the contents of the data as well as access patterns from an untrusted cloud provider. We target a scenario where multiple users …
K He, J Chen, Q Yuan, S Ji, D He… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As an important security property of cloud storage, data integrity has not been sufficiently studied under the multi-writer model, where a group of users work on shared files …
Modern web services rob users of low-level control over cloud storage—a user's single logical data set is scattered across multiple storage silos whose access controls are set by …
Private information retrieval (PIR) is a fundamental tool for preserving query privacy when accessing outsourced data. All previous PIR constructions have significant costs preventing …
Y Hu, S Kumar, RA Popa - 17th USENIX Symposium on Networked …, 2020 - usenix.org
Data-sharing systems are often used to store sensitive data. Both academia and industry have proposed numerous solutions to protect the user privacy and data integrity from a …