메뉴 건너뛰기




Volumn , Issue , 2013, Pages 253-267

ObliviStore: High performance oblivious cloud storage

Author keywords

file system; oblivious ram; oblivious storage; oblivistore; oram

Indexed keywords

DESIGN AND BUILD; FILE SYSTEMS; HIGH THROUGHPUT; OBLIVISTORE; ORAM; PREVENT INFORMATION LEAKAGE; SECURITY CHALLENGES; SOLID STATE DRIVES;

EID: 84881250193     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2013.25     Document Type: Conference Paper
Times cited : (189)

References (48)
  • 1
    • 84881230305 scopus 로고    scopus 로고
    • http://www.storagereview.com/php/benchmark/suite-v4.php?typeID= 10&testbedID=4&osID=6&raidconfigID=1&numDrives=1&devID-0= 368&devCnt=1.
  • 3
    • 84881220150 scopus 로고    scopus 로고
    • Sloccount. http://www.dwheeler.com/sloccount/.
    • Sloccount
  • 6
    • 84881223761 scopus 로고    scopus 로고
    • Personal communication with Radu Sion and Peter Williams., Nov.
    • Personal communication with Radu Sion and Peter Williams., Nov. 2012.
    • (2012)
  • 7
    • 33746784225 scopus 로고    scopus 로고
    • Almost optimal private information retrieval
    • D. Asonov and J.-C. Freytag. Almost optimal private information retrieval. In PET, 2003.
    • (2003) PET
    • Asonov, D.1    Freytag, J.-C.2
  • 8
    • 84874786070 scopus 로고    scopus 로고
    • Obliviad: Provably secure and practical online behavioral advertising
    • M. Backes, A. Kate, M. Maffe, and K. Pecina. Obliviad: Provably secure and practical online behavioral advertising. In S & P, 2012.
    • (2012) S & P
    • Backes, M.1    Kate, A.2    Maffe, M.3    Pecina, K.4
  • 11
    • 82955204091 scopus 로고    scopus 로고
    • Perfectly secure oblivious RAM without random oracles
    • I. Damgård, S. Meldgaard, and J. B. Nielsen. Perfectly secure oblivious RAM without random oracles. In TCC, 2011.
    • (2011) TCC
    • Damgård, I.1    Meldgaard, S.2    Nielsen, J.B.3
  • 12
    • 84881225045 scopus 로고    scopus 로고
    • A secure processor architecture for encrypted computation on untrusted programs
    • C. W. Fletcher, M. v. Dijk, and S. Devadas. A secure processor architecture for encrypted computation on untrusted programs. In STC, 2012.
    • (2012) STC
    • Fletcher, C.W.1    Dijk, M.V.2    Devadas, S.3
  • 13
    • 0023547498 scopus 로고
    • Towards a theory of software protection and simulation by oblivious RAMs
    • O. Goldreich. Towards a theory of software protection and simulation by oblivious RAMs. In STOC, 1987.
    • (1987) STOC
    • Goldreich, O.1
  • 14
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious RAMs. J. ACM, 1996.
    • (1996) J. ACM
    • Goldreich, O.1    Ostrovsky, R.2
  • 15
    • 84881228714 scopus 로고    scopus 로고
    • Privacy-preserving access of outsourced data via oblivious RAM simulation
    • M. T. Goodrich and M. Mitzenmacher. Privacy-preserving access of outsourced data via oblivious RAM simulation. In ICALP, 2011.
    • (2011) ICALP
    • Goodrich, M.T.1    Mitzenmacher, M.2
  • 18
    • 84860169197 scopus 로고    scopus 로고
    • Privacy-preserving group data access via stateless oblivious RAM simulation
    • M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia. Privacy-preserving group data access via stateless oblivious RAM simulation. In SODA, 2012.
    • (2012) SODA
    • Goodrich, M.T.1    Mitzenmacher, M.2    Ohrimenko, O.3    Tamassia, R.4
  • 20
    • 17444392883 scopus 로고    scopus 로고
    • Protecting client privacy with trusted computing at the server
    • DOI 10.1109/MSP.2005.49
    • A. Iliev and S. W. Smith. Protecting client privacy with trusted computing at the server. IEEE Security and Privacy, 3(2):20-28, Mar. 2005. (Pubitemid 40542058)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.2 , pp. 20-28
    • Iliev, A.1    Smith, S.W.2
  • 23
    • 84860181777 scopus 로고    scopus 로고
    • On the (in)security of hash-based oblivious RAM and a new balancing scheme
    • E. Kushilevitz, S. Lu, and R. Ostrovsky. On the (in)security of hash-based oblivious RAM and a new balancing scheme. In SODA, 2012.
    • (2012) SODA
    • Kushilevitz, E.1    Lu, S.2    Ostrovsky, R.3
  • 24
    • 0002970064 scopus 로고
    • On micro-kernel construction
    • J. Liedtke. On micro-kernel construction. In SOSP, 1995.
    • (1995) SOSP
    • Liedtke, J.1
  • 25
    • 84890416103 scopus 로고    scopus 로고
    • Shroud: Ensuring private access to large-scale data in the data center
    • J. R. Lorch, B. Parno, J. W. Mickens, M. Raykova, and J. Schiffman. Shroud: Ensuring private access to large-scale data in the data center. FAST, 2013:199-213, 2013.
    • (2013) FAST , vol.2013 , pp. 199-213
    • Lorch, J.R.1    Parno, B.2    Mickens, J.W.3    Raykova, M.4    Schiffman, J.5
  • 29
    • 0030714231 scopus 로고    scopus 로고
    • Private information storage
    • extended abstract
    • R. Ostrovsky and V. Shoup. Private information storage (extended abstract). In STOC, pages 294-303, 1997.
    • (1997) STOC , pp. 294-303
    • Ostrovsky, R.1    Shoup, V.2
  • 31
    • 84881231420 scopus 로고    scopus 로고
    • Oblivious RAM revisited
    • B. Pinkas and T. Reinman. Oblivious RAM revisited. In CRYPTO, 2010.
    • (2010) CRYPTO
    • Pinkas, B.1    Reinman, T.2
  • 33
    • 84869436864 scopus 로고    scopus 로고
    • Policy-sealed data: A new abstraction for building trusted cloud services
    • N. Santos, R. Rodrigues, K. P. Gummadi, and S. Saroiu. Policy-sealed data: a new abstraction for building trusted cloud services. In Usenix Security, 2012.
    • (2012) Usenix Security
    • Santos, N.1    Rodrigues, R.2    Gummadi, K.P.3    Saroiu, S.4
  • 36
    • 17444403861 scopus 로고    scopus 로고
    • Outbound authentication for programmable secure coprocessors
    • S. W. Smith. Outbound authentication for programmable secure coprocessors. In ESORICS, 2002.
    • (2002) ESORICS
    • Smith, S.W.1
  • 37
    • 0034809926 scopus 로고    scopus 로고
    • Practical server privacy with secure coprocessors
    • S. W. Smith and D. Safford. Practical server privacy with secure coprocessors. IBM Syst. J., 40(3):683-695, Mar. 2001. (Pubitemid 32933425)
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 683-695
    • Smith, S.W.1    Safford, D.2
  • 38
    • 0033293553 scopus 로고    scopus 로고
    • Building a high-performance, programmable secure coprocessor
    • S. W. Smith and S. Weingart. Building a high-performance, programmable secure coprocessor. Comput. Netw., 31(9):831-860, 1999.
    • (1999) Comput. Netw. , vol.31 , Issue.9 , pp. 831-860
    • Smith, S.W.1    Weingart, S.2
  • 40
    • 85180805635 scopus 로고    scopus 로고
    • Towards practical oblivious RAM
    • E. Stefanov, E. Shi, and D. Song. Towards practical oblivious RAM. In NDSS, 2012.
    • (2012) NDSS
    • Stefanov, E.1    Shi, E.2    Song, D.3
  • 41
    • 84874906821 scopus 로고    scopus 로고
    • Iris: A scalable cloud file system with efficient integrity checks
    • E. Stefanov, M. van Dijk, A. Oprea, and A. Juels. Iris: A scalable cloud file system with efficient integrity checks. In ACSAC, 2012.
    • (2012) ACSAC
    • Stefanov, E.1    Van Dijk, M.2    Oprea, A.3    Juels, A.4
  • 42
    • 77954565496 scopus 로고    scopus 로고
    • Nova: A microhypervisor-based secure virtualization architecture
    • U. Steinberg and B. Kauer. Nova: a microhypervisor-based secure virtualization architecture. In EuroSys, 2010.
    • (2010) EuroSys
    • Steinberg, U.1    Kauer, B.2
  • 44
    • 84881256639 scopus 로고    scopus 로고
    • Round-optimal access privacy on outsourced storage
    • P. Williams and R. Sion. Round-optimal access privacy on outsourced storage. In CCS, 2012.
    • (2012) CCS
    • Williams, P.1    Sion, R.2
  • 45
    • 84869381921 scopus 로고    scopus 로고
    • Single round access privacy on outsourced storage
    • P. Williams and R. Sion. Single round access privacy on outsourced storage. In CCS, 2012.
    • (2012) CCS
    • Williams, P.1    Sion, R.2
  • 46
    • 70349278621 scopus 로고    scopus 로고
    • Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
    • P. Williams, R. Sion, and B. Carbunar. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In CCS, 2008.
    • (2008) CCS
    • Williams, P.1    Sion, R.2    Carbunar, B.3
  • 47
    • 84869453208 scopus 로고    scopus 로고
    • Privatefs: A parallel oblivious file system
    • P. Williams, R. Sion, and A. Tomescu. Privatefs: A parallel oblivious file system. In CCS, 2012.
    • (2012) CCS
    • Williams, P.1    Sion, R.2    Tomescu, A.3
  • 48
    • 80755169468 scopus 로고    scopus 로고
    • Sedic: Privacy-aware data intensive computing on hybrid clouds
    • K. Zhang, X. Zhou, Y. Chen, X. Wang, and Y. Ruan. Sedic: privacy-aware data intensive computing on hybrid clouds. In CCS, 2011.
    • (2011) CCS
    • Zhang, K.1    Zhou, X.2    Chen, Y.3    Wang, X.4    Ruan, Y.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.