메뉴 건너뛰기




Volumn , Issue , 2014, Pages 749-764

Burst ORAM: Minimizing ORAM response times for bursty access patterns

Author keywords

[No Author keywords available]

Indexed keywords

BANDWIDTH; ONLINE SYSTEMS;

EID: 84937774864     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (69)

References (28)
  • 2
    • 82655182943 scopus 로고    scopus 로고
    • Design implications for enterprise storage systems via multidimensional trace analysis
    • CHEN, Y., SRINIVASAN, K., GOODSON, G., and KATZ, R. Design implications for enterprise storage systems via multidimensional trace analysis. In Proc. ACM SOSP (2011).
    • (2011) Proc. ACM SOSP
    • Chen, Y.1    Srinivasan, K.2    Goodson, G.3    Katz, R.4
  • 4
    • 79953223285 scopus 로고    scopus 로고
    • Perfectly secure oblivious RAM without random oracles
    • DAMGÅRD, I., MELDGAARD, S., and NIELSEN, J. B. Perfectly secure oblivious RAM without random oracles. In TCC (2011), pp. 144-163.
    • (2011) TCC , pp. 144-163
    • Damgård, I.1    Meldgaard, S.2    Nielsen, J.B.3
  • 5
    • 84995516377 scopus 로고    scopus 로고
    • Compromising privacy in precise query protocols
    • DAUTRICH, J., and RAVISHANKAR, C. Compromising privacy in precise query protocols. In Proc. EDBT (2013).
    • (2013) Proc. EDBT
    • Dautrich, J.1    Ravishankar, C.2
  • 8
    • 0023547498 scopus 로고
    • Towards a theory of software protection and simulation by oblivious rams
    • GOLDREICH, O. Towards a theory of software protection and simulation by oblivious rams. In STOC (1987).
    • (1987) STOC
    • Goldreich, O.1
  • 9
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • GOLDREICH, O., and OSTROVSKY, R. Software protection and simulation on oblivious RAMs. Journal of the ACM (JACM) 43, 3 (1996), 431-473.
    • (1996) Journal of the ACM (JACM) , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 10
    • 79960005023 scopus 로고    scopus 로고
    • Privacy-preserving access of outsourced data via oblivious RAM simulation
    • GOODRICH, M., and MITZENMACHER, M. Privacy-preserving access of outsourced data via oblivious RAM simulation. Automata, Languages and Programming (2011), 576-587.
    • (2011) Automata, Languages and Programming , pp. 576-587
    • Goodrich, M.1    Mitzenmacher, M.2
  • 11
    • 84860169197 scopus 로고    scopus 로고
    • Privacy-preserving group data access via stateless oblivious RAM simulation
    • GOODRICH, M. T., MITZENMACHER, M., OHRIMENKO, O., and TAMASSIA, R. Privacy-preserving group data access via stateless oblivious RAM simulation. In Proc. SODA (2012), SIAM, pp. 157-167.
    • (2012) Proc. SODA , pp. 157-167
    • Goodrich, M.T.1    Mitzenmacher, M.2    Ohrimenko, O.3    Tamassia, R.4
  • 12
    • 85179556059 scopus 로고    scopus 로고
    • Access pattern disclosure on searchable encryption: Ramification, attack and mitigation
    • ISLAM, M., KUZU, M., and KANTARCIOGLU, M. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In Proc. NDSS (2012).
    • (2012) Proc. NDSS
    • Islam, M.1    Kuzu, M.2    Kantarcioglu, M.3
  • 13
    • 84860181777 scopus 로고    scopus 로고
    • On the (in)security of hash-based oblivious RAM and a new balancing scheme
    • KUSHILEVITZ, E., LU, S., and OSTROVSKY, R. On the (in)security of hash-based oblivious RAM and a new balancing scheme. In Proc. SODA (2012), SIAM, pp. 143-156.
    • (2012) Proc. SODA , pp. 143-156
    • Kushilevitz, E.1    Lu, S.2    Ostrovsky, R.3
  • 14
    • 84945511204 scopus 로고    scopus 로고
    • Measurement and analysis of large-scale network file system workloads
    • USENIX Association
    • LEUNG, A. W., PASUPATHY, S., GOODSON, G., and MILLER, E. L. Measurement and analysis of large-scale network file system workloads. In Proc. USENIX ATC (2008), USENIX Association, pp. 213-226.
    • (2008) Proc. USENIX ATC , pp. 213-226
    • Leung, A.W.1    Pasupathy, S.2    Goodson, G.3    Miller, E.L.4
  • 15
    • 84890416103 scopus 로고    scopus 로고
    • Shroud: Ensuring private access to large-scale data in the data center
    • LORCH, J. R., PARNO, B., MICKENS, J. W., RAYKOVA, M., and SCHIFFMAN, J. Shroud: Ensuring private access to large-scale data in the data center. FAST (2013), 199-213.
    • (2013) FAST , pp. 199-213
    • Lorch, J.R.1    Parno, B.2    Mickens, J.W.3    Raykova, M.4    Schiffman, J.5
  • 17
    • 85091187696 scopus 로고    scopus 로고
    • Efficient private file retrieval by combining ORAM and PIR
    • MAYBERRY, T., BLASS, E.-O., and CHAN, A. H. Efficient private file retrieval by combining ORAM and PIR. In NDSS (2014).
    • (2014) NDSS
    • Mayberry, T.1    Blass, E.-O.2    Chan, A.H.3
  • 18
    • 0030714231 scopus 로고    scopus 로고
    • Private information storage (extended abstract)
    • OSTROVSKY, R., and SHOUP, V. Private information storage (extended abstract). In STOC (1997), pp. 294-303.
    • (1997) STOC , pp. 294-303
    • Ostrovsky, R.1    Shoup, V.2
  • 19
    • 84881231420 scopus 로고    scopus 로고
    • Oblivious RAM revisited
    • PINKAS, B., and REINMAN, T. Oblivious RAM revisited. In CRYPTO (2010).
    • (2010) CRYPTO
    • Pinkas, B.1    Reinman, T.2
  • 20
    • 84881169695 scopus 로고    scopus 로고
    • Design space exploration and optimization of path oblivious RAM in secure processors
    • REN, L., YU, X., FLETCHER, C. W., VAN DIJK, M., and DEVADA S, S. Design space exploration and optimization of path oblivious RAM in secure processors. In Proc. ISCA. 2013.
    • (2013) Proc. ISCA
    • Ren, L.1    Yu, X.2    Fletcher, C.W.3    Van Dijk, M.4    Devadas, S.5
  • 22
    • 84889071325 scopus 로고    scopus 로고
    • Multi-cloud oblivious storage
    • STEFANOV, E., and SHI, E. Multi-Cloud Oblivious Storage. In CCS (2013).
    • (2013) CCS
    • Stefanov, E.1    Shi, E.2
  • 26
    • 84875099300 scopus 로고    scopus 로고
    • Sr-oram: Single round-trip oblivious ram
    • WILLIAMS, P., and SION, R. Sr-oram: Single round-trip oblivious ram. ACNS, industrial track (2012), 19-33.
    • (2012) ACNS, Industrial Track , pp. 19-33
    • Williams, P.1    Sion, R.2
  • 27
    • 70349278621 scopus 로고    scopus 로고
    • Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
    • WILLIAMS, P., SION, R., and CARBUNAR, B. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In Proc. ACM CCS (2008), pp. 139-148.
    • (2008) Proc. ACM CCS , pp. 139-148
    • Williams, P.1    Sion, R.2    Carbunar, B.3
  • 28
    • 84869453208 scopus 로고    scopus 로고
    • PrivateFS: A parallel oblivious file system
    • WILLIAMS, P., SION, R., and TOMESCU, A. PrivateFS: A parallel oblivious file system. In CCS (2012).
    • (2012) CCS
    • Williams, P.1    Sion, R.2    Tomescu, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.