메뉴 건너뛰기




Volumn , Issue , 2015, Pages 313-324

Tunably-oblivious memory: Generalizing ORAM to enable privacy-efficiency tradeoffs

Author keywords

Data privacy; Oblivious RAM; Privacy tradeoff

Indexed keywords

EFFICIENCY; RANDOM ACCESS STORAGE;

EID: 84928112870     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2699026.2699097     Document Type: Conference Paper
Times cited : (2)

References (26)
  • 2
    • 84969253460 scopus 로고    scopus 로고
    • The random graph threshold for k-orientiability and a fast algorithm for optimal multiple-choice allocation
    • Society for Industrial and Applied Mathematics
    • J. A. Cain, P. Sanders, and N. Wormald. The random graph threshold for k-orientiability and a fast algorithm for optimal multiple-choice allocation. In Proc. SODA, pages 469-476. Society for Industrial and Applied Mathematics, 2007.
    • (2007) Proc. SODA , pp. 469-476
    • Cain, J.A.1    Sanders, P.2    Wormald, N.3
  • 4
    • 84995516377 scopus 로고    scopus 로고
    • Compromising privacy in precise query protocols
    • J. Dautrich and C. Ravishankar. Compromising privacy in precise query protocols. In Proc. EDBT, 2013.
    • (2013) Proc. EDBT
    • Dautrich, J.1    Ravishankar, C.2
  • 5
    • 84928107803 scopus 로고    scopus 로고
    • Combining oram with pir to minimize bandwidth costs
    • J. Dautrich and C. Ravishankar. Combining oram with pir to minimize bandwidth costs. In CODASPY, 2015.
    • (2015) CODASPY
    • Dautrich, J.1    Ravishankar, C.2
  • 6
    • 84937774864 scopus 로고    scopus 로고
    • Burst ORAM: Minimizing ORAM response times for bursty access patterns
    • J. Dautrich, E. Stefanov, and E. Shi. Burst ORAM: Minimizing ORAM response times for bursty access patterns. In USENIX Security, 2014.
    • (2014) USENIX Security
    • Dautrich, J.1    Stefanov, E.2    Shi, E.3
  • 9
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious RAMs. Journal of the ACM (JACM), 43(3):431-473, 1996.
    • (1996) Journal of the ACM (JACM) , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 10
    • 84860169197 scopus 로고    scopus 로고
    • Privacy-preserving group data access via stateless oblivious RAM simulation
    • SIAM
    • M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia. Privacy-preserving group data access via stateless oblivious RAM simulation. In Proc. SODA, pages 157-167. SIAM, 2012.
    • (2012) Proc. SODA , pp. 157-167
    • Goodrich, M.T.1    Mitzenmacher, M.2    Ohrimenko, O.3    Tamassia, R.4
  • 11
    • 85179556059 scopus 로고    scopus 로고
    • Access pattern disclosure on searchable encryption: Ramification, attack and mitigation
    • M. Islam, M. Kuzu, and M. Kantarcioglu. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In NDSS, 2012.
    • (2012) NDSS
    • Islam, M.1    Kuzu, M.2    Kantarcioglu, M.3
  • 13
    • 84860181777 scopus 로고    scopus 로고
    • On the (in)security of hash-based oblivious RAM and a new balancing scheme
    • SIAM
    • E. Kushilevitz, S. Lu, and R. Ostrovsky. On the (in)security of hash-based oblivious RAM and a new balancing scheme. In Proc. SODA, pages 143-156. SIAM, 2012.
    • (2012) Proc. SODA , pp. 143-156
    • Kushilevitz, E.1    Lu, S.2    Ostrovsky, R.3
  • 14
    • 84890416103 scopus 로고    scopus 로고
    • Shroud: Ensuring private access to large-scale data in the data center
    • J. R. Lorch, B. Parno, J. W. Mickens, M. Raykova, and J. Schiffman. Shroud: Ensuring private access to large-scale data in the data center. FAST, pages 199-213, 2013.
    • (2013) FAST , pp. 199-213
    • Lorch, J.R.1    Parno, B.2    Mickens, J.W.3    Raykova, M.4    Schiffman, J.5
  • 16
    • 84928147292 scopus 로고    scopus 로고
    • Efficient private file retrieval by combining ORAM and PIR
    • T. Mayberry, E.-O. Blass, and A. H. Chan. Efficient private file retrieval by combining ORAM and PIR. In NDSS, 2014.
    • NDSS , vol.2014
    • Mayberry, T.1    Blass, E.-O.2    Chan, A.H.3
  • 17
    • 70350423055 scopus 로고    scopus 로고
    • Some open questions related to cuckoo hashing
    • Springer
    • M. Mitzenmacher. Some open questions related to cuckoo hashing. In Algorithms-ESA 2009, pages 1-10. Springer, 2009.
    • (2009) Algorithms-ESA , pp. 1-10
    • Mitzenmacher, M.1
  • 20
    • 70349125738 scopus 로고    scopus 로고
    • On the computational practicality of private information retrieval
    • R. Sion. On the computational practicality of private information retrieval. In Proc. NDSS, 2007.
    • (2007) Proc. NDSS
    • Sion, R.1
  • 21
    • 84889071325 scopus 로고    scopus 로고
    • Multi-cloud oblivious storage
    • E. Stefanov and E. Shi. Multi-Cloud Oblivious Storage. In CCS, 2013.
    • (2013) CCS
    • Stefanov, E.1    Shi, E.2
  • 23
    • 85180805635 scopus 로고    scopus 로고
    • Towards practical oblivious RAM
    • E. Stefanov, E. Shi, and D. Song. Towards practical oblivious RAM. NDSS, 2012.
    • (2012) NDSS
    • Stefanov, E.1    Shi, E.2    Song, D.3
  • 25
    • 84869453208 scopus 로고    scopus 로고
    • PrivateFS: A parallel oblivious file system
    • P. Williams, R. Sion, and A. Tomescu. PrivateFS: A parallel oblivious file system. In CCS, 2012.
    • (2012) CCS
    • Williams, P.1    Sion, R.2    Tomescu, A.3
  • 26
    • 84888985277 scopus 로고    scopus 로고
    • Generalized external interaction with tamper-resistant hardware with bounded information leakage
    • ACM
    • X. Yu, C. W. Fletcher, L. Ren, M. v. Dijk, and S. Devadas. Generalized external interaction with tamper-resistant hardware with bounded information leakage. In Proc. ACM CCSW, pages 23-34. ACM, 2013.
    • (2013) Proc. ACM CCSW , pp. 23-34
    • Yu, X.1    Fletcher, C.W.2    Ren, L.3    Dijk, M.V.4    Devadas, S.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.