Revisiting leakage abuse attacks

L Blackstone, S Kamara, T Moataz - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Encrypted search algorithms (ESA) are cryptographic algorithms that support search over
encrypted data. ESAs can be designed with various primitives including …

Solidus: Confidential distributed ledger transactions via PVORM

E Cecchetti, F Zhang, Y Ji, A Kosba, A Juels… - Proceedings of the 2017 …, 2017 - dl.acm.org
Blockchains and more general distributed ledgers are becoming increasingly popular as
efficient, reliable, and persistent records of data and transactions. Unfortunately, they ensure …

Privacy-preserving data encryption strategy for big data in mobile cloud computing

K Gai, M Qiu, H Zhao - IEEE Transactions on Big Data, 2017 - ieeexplore.ieee.org
Privacy has become a considerable issue when the applications of big data are dramatically
growing in cloud computing. The benefits of the implementation for these emerging …

{DORY}: An encrypted search system with distributed trust

E Dauterman, E Feng, E Luo, RA Popa… - 14th USENIX Symposium …, 2020 - usenix.org
Efficient, leakage-free search on encrypted data has remained an unsolved problem for the
last two decades; efficient schemes are vulnerable to leakage-abuse attacks, and schemes …

PriRadar: A privacy-preserving framework for spatial crowdsourcing

D Yuan, Q Li, G Li, Q Wang… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Privacy leakage is a serious issue in spatial crowdsourcing in various scenarios. In this
paper, we study privacy protection in spatial crowdsourcing. The main challenge is to …

Taostore: Overcoming asynchronicity in oblivious data storage

C Sahin, V Zakhary, A El Abbadi, H Lin… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
We consider oblivious storage systems hiding both the contents of the data as well as
access patterns from an untrusted cloud provider. We target a scenario where multiple users …

Dynamic group-oriented provable data possession in the cloud

K He, J Chen, Q Yuan, S Ji, D He… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As an important security property of cloud storage, data integrity has not been sufficiently
studied under the multi-writer model, where a group of users work on shared files …

Sieve: Cryptographically enforced access control for user data in untrusted clouds

F Wang, J Mickens, N Zeldovich… - … USENIX Symposium on …, 2016 - usenix.org
Modern web services rob users of low-level control over cloud storage—a user's single
logical data set is scattered across multiple storage silos whose access controls are set by …

Private stateful information retrieval

S Patel, G Persiano, K Yeo - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
Private information retrieval (PIR) is a fundamental tool for preserving query privacy when
accessing outsourced data. All previous PIR constructions have significant costs preventing …

Ghostor: Toward a Secure {Data-Sharing} System from Decentralized Trust

Y Hu, S Kumar, RA Popa - 17th USENIX Symposium on Networked …, 2020 - usenix.org
Data-sharing systems are often used to store sensitive data. Both academia and industry
have proposed numerous solutions to protect the user privacy and data integrity from a …