메뉴 건너뛰기




Volumn , Issue , 2013, Pages 247-258

Multi-cloud oblivious storage

Author keywords

multi cloud; oblivious ram; outsourced storage; privacy

Indexed keywords

AMAZON EC2; BANDWIDTH PROVISIONING; BANDWIDTH-CONSTRAINED; MICROSOFT; MOBILE INTERNET; MULTI-CLOUD; REAL-WORLD;

EID: 84889071325     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2508859.2516673     Document Type: Conference Paper
Times cited : (92)

References (35)
  • 3
    • 84889068370 scopus 로고    scopus 로고
    • Trusted computing group. http://www.trustedcomputinggroup.org/.
  • 4
    • 84889024303 scopus 로고    scopus 로고
    • Windows azure. http://www.windowsazure.com/.
  • 5
    • 33746784225 scopus 로고    scopus 로고
    • Almost optimal private information retrieval
    • D. Asonov and J.-C. Freytag. Almost optimal private information retrieval. In PET, 2003.
    • (2003) PET
    • Asonov, D.1    Freytag, J.-C.2
  • 6
    • 84874786070 scopus 로고    scopus 로고
    • Obliviad: Provably secure and practical online behavioral advertising
    • M. Backes, A. Kate, M. Maffe, and K. Pecina. Obliviad: Provably secure and practical online behavioral advertising. In S & P, 2012.
    • (2012) S & P
    • Backes, M.1    Kate, A.2    Maffe, M.3    Pecina, K.4
  • 9
    • 82955204091 scopus 로고    scopus 로고
    • Perfectly secure oblivious RAM without random oracles
    • I. Damgård, S. Meldgaard, and J. B. Nielsen. Perfectly secure oblivious RAM without random oracles. In TCC, 2011.
    • (2011) TCC
    • Damgård, I.1    Meldgaard, S.2    Nielsen, J.B.3
  • 10
    • 0023547498 scopus 로고
    • Towards a theory of software protection and simulation by oblivious RAMs
    • O. Goldreich. Towards a theory of software protection and simulation by oblivious RAMs. In STOC, 1987.
    • (1987) STOC
    • Goldreich, O.1
  • 11
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious RAMs. J. ACM, 1996.
    • (1996) J. ACM
    • Goldreich, O.1    Ostrovsky, R.2
  • 12
    • 84855243919 scopus 로고    scopus 로고
    • Randomized shellsort: A simple data-oblivious sorting algorithm
    • Dec.
    • M. T. Goodrich. Randomized shellsort: A simple data-oblivious sorting algorithm. J. ACM, 58(6):27:1-27:26, Dec. 2011.
    • (2011) J. ACM , vol.58 , Issue.6
    • Goodrich, M.T.1
  • 13
    • 84881228714 scopus 로고    scopus 로고
    • Privacy-preserving access of outsourced data via oblivious RAM simulation
    • M. T. Goodrich and M. Mitzenmacher. Privacy-preserving access of outsourced data via oblivious RAM simulation. In ICALP, 2011.
    • (2011) ICALP
    • Goodrich, M.T.1    Mitzenmacher, M.2
  • 16
    • 84860169197 scopus 로고    scopus 로고
    • Privacy-preserving group data access via stateless oblivious RAM simulation
    • M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia. Privacy-preserving group data access via stateless oblivious RAM simulation. In SODA, 2012.
    • (2012) SODA
    • Goodrich, M.T.1    Mitzenmacher, M.2    Ohrimenko, O.3    Tamassia, R.4
  • 17
    • 17444392883 scopus 로고    scopus 로고
    • Protecting client privacy with trusted computing at the server
    • Mar.
    • A. Iliev and S. W. Smith. Protecting client privacy with trusted computing at the server. IEEE Security and Privacy, 3(2):20-28, Mar. 2005.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.2 , pp. 20-28
    • Iliev, A.1    Smith, S.W.2
  • 19
    • 84860181777 scopus 로고    scopus 로고
    • On the (in)security of hash-based oblivious RAM and a new balancing scheme
    • E. Kushilevitz, S. Lu, and R. Ostrovsky. On the (in)security of hash-based oblivious RAM and a new balancing scheme. In SODA, 2012.
    • (2012) SODA
    • Kushilevitz, E.1    Lu, S.2    Ostrovsky, R.3
  • 20
    • 84881262607 scopus 로고    scopus 로고
    • Shroud: Enabling private access to large-scale data in the data center
    • J. R. Lorch, J. W. Mickens, B. Parno, M. Raykova, and J. Schiffman. Shroud: Enabling private access to large-scale data in the data center. In FAST, 2013.
    • (2013) FAST
    • Lorch, J.R.1    Mickens, J.W.2    Parno, B.3    Raykova, M.4    Schiffman, J.5
  • 21
    • 84875106434 scopus 로고    scopus 로고
    • Distributed oblivious ram for secure two-party computation
    • Report 2011/384
    • S. Lu and R. Ostrovsky. Distributed oblivious ram for secure two-party computation. Cryptology ePrint Archive, Report 2011/384, 2011. http://eprint.iacr.org/.
    • (2011) Cryptology ePrint Archive
    • Lu, S.1    Ostrovsky, R.2
  • 23
    • 0030714231 scopus 로고    scopus 로고
    • Private information storage (extended abstract)
    • R. Ostrovsky and V. Shoup. Private information storage (extended abstract). In STOC, pages 294-303, 1997.
    • (1997) STOC , pp. 294-303
    • Ostrovsky, R.1    Shoup, V.2
  • 25
    • 84881231420 scopus 로고    scopus 로고
    • Oblivious RAM revisited
    • B. Pinkas and T. Reinman. Oblivious RAM revisited. In CRYPTO, 2010.
    • (2010) CRYPTO
    • Pinkas, B.1    Reinman, T.2
  • 27
    • 82955173838 scopus 로고    scopus 로고
    • Oblivious RAM with O ((log N) 3) worst-case cost
    • E. Shi, T.-H. H. Chan, E. Stefanov, and M. Li. Oblivious RAM with O ((log N) 3) worst-case cost. In ASIACRYPT, pages 197-214, 2011.
    • (2011) ASIACRYPT , pp. 197-214
    • Shi, E.1    Chan, T.-H.H.2    Stefanov, E.3    Li, M.4
  • 28
    • 0034809926 scopus 로고    scopus 로고
    • Practical server privacy with secure coprocessors
    • Mar.
    • S. W. Smith and D. Safford. Practical server privacy with secure coprocessors. IBM Syst. J., 40(3):683-695, Mar. 2001.
    • (2001) IBM Syst. J. , vol.40 , Issue.3 , pp. 683-695
    • Smith, S.W.1    Safford, D.2
  • 31
    • 85180805635 scopus 로고    scopus 로고
    • Towards practical oblivious RAM
    • E. Stefanov, E. Shi, and D. Song. Towards practical oblivious RAM. In NDSS, 2012.
    • (2012) NDSS
    • Stefanov, E.1    Shi, E.2    Song, D.3
  • 33
    • 84881256639 scopus 로고    scopus 로고
    • Round-optimal access privacy on outsourced storage
    • P. Williams and R. Sion. Round-optimal access privacy on outsourced storage. In CCS, 2012.
    • (2012) CCS
    • Williams, P.1    Sion, R.2
  • 34
    • 70349278621 scopus 로고    scopus 로고
    • Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
    • P. Williams, R. Sion, and B. Carbunar. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In CCS, 2008.
    • (2008) CCS
    • Williams, P.1    Sion, R.2    Carbunar, B.3
  • 35
    • 84869453208 scopus 로고    scopus 로고
    • Privatefs: A parallel oblivious file system
    • P. Williams, R. Sion, and A. Tomescu. Privatefs: A parallel oblivious file system. In CCS, 2012.
    • (2012) CCS
    • Williams, P.1    Sion, R.2    Tomescu, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.