Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2022
Foundations of Differentially Oblivious Algorithms
Journal of the ACM (JACM), Volume 69, Issue 4Article No.: 27, Pages 1–49https://doi.org/10.1145/3555984It is well-known that a program’s memory access pattern can leak information about its input. To thwart such leakage, most existing works adopt the technique of oblivious RAM (ORAM) simulation. Such an obliviousness notion has stimulated much debate. ...
- research-articleMay 2022
Efficient Oblivious Permutation via the Waksman Network
ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications SecurityPages 771–783https://doi.org/10.1145/3488932.3497761Memory accesses to data stored on an untrusted server are known to leak information, even if the data is encrypted. The oblivious permutation (OP) is a key primitive for algorithms and protocols that are designed to hide these client accesses to the ...
- short-paperSeptember 2019
Hopscotch: a micro-benchmark suite for memory performance evaluation
MEMSYS '19: Proceedings of the International Symposium on Memory SystemsPages 167–172https://doi.org/10.1145/3357526.3357574Due to the ever-increasing gap between the speed of processing elements and the speed at which memory systems can feed them with data, current computing systems are often bottlenecked by memory bandwidth. Researchers are developing new memory ...
- research-articleMay 2019
CAOS: Concurrent-Access Obfuscated Store
SACMAT '19: Proceedings of the 24th ACM Symposium on Access Control Models and TechnologiesPages 13–24https://doi.org/10.1145/3322431.3325101This paper proposes Concurrent-Access Obfuscated Store (CAOS), a construction for remote data storage that provides access-pattern obfuscation in a honest-but-curious adversarial model, while allowing for low bandwidth overhead and client storage. ...
- research-articleApril 2018
Path ORAM: An Extremely Simple Oblivious RAM Protocol
- Emil Stefanov,
- Marten Van Dijk,
- Elaine Shi,
- T.-H. Hubert Chan,
- Christopher Fletcher,
- Ling Ren,
- Xiangyao Yu,
- Srinivas Devadas
Journal of the ACM (JACM), Volume 65, Issue 4Article No.: 18, Pages 1–26https://doi.org/10.1145/3177872We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme known to date with small client storage. We formally prove that Path ORAM ...
-
- tutorialMay 2017
Pattern-Directed Replication Scheme for Heterogeneous Object-based Storage
CCGrid '17: Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid ComputingPages 645–648https://doi.org/10.1109/CCGRID.2017.148Data replication is a key technique to achieve data availability, reliability, and optimized performance in distributed storage systems and data centers. In recent years, with the emergence of new storage devices, heterogeneous object-based storage ...
- short-paperOctober 2016
Oblivious RAM as a Substrate for Cloud Storage -- The Leakage Challenge Ahead
CCSW '16: Proceedings of the 2016 ACM on Cloud Computing Security WorkshopPages 49–53https://doi.org/10.1145/2996429.2996430Oblivious RAM (ORAM) is a well-established technology to hide data access patterns from an untrusted storage system. Although research in ORAM has been spurred in the last few years with the irruption of cloud computing, it is still unclear whether ORAM ...
- research-articleMay 2016
Secure Dynamic SSE via Access Indistinguishable Storage
ASIA CCS '16: Proceedings of the 11th ACM on Asia Conference on Computer and Communications SecurityPages 535–546https://doi.org/10.1145/2897845.2897884Cloud storage services such as Dropbox [1] and Google Drive [2] are becoming more and more popular. On the one hand, they provide users with mobility, scalability, and convenience. However, privacy issues arise when the storage becomes not fully ...
- research-articleOctober 2015
Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward
CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications SecurityPages 837–849https://doi.org/10.1145/2810103.2813649To understand the gap between theory and practice for oblivious cloud storage, we experimentally evaluate four representative Oblivious RAM (ORAM) designs on Amazon S3. We replay realistic application traces to these ORAMs in order to understand whether ...
- ArticleAugust 2014
Design and Evaluation for a Multi-cloud Based Storage System with Privacy Preserving
NAS '14: Proceedings of the 2014 9th IEEE International Conference on Networking, Architecture, and StoragePages 138–142https://doi.org/10.1109/NAS.2014.30We present a multi-cloud based storage architecture that can effectively protect users' privacy and data security by implementing the concept of Oblivious RAM in a logical layer. It allows users to conceal the reading/writing operation types and access ...
- research-articleJune 2014
S-ORAM: a segmentation-based oblivious RAM
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 147–158https://doi.org/10.1145/2590296.2590323As outsourcing data to remote storage servers gets popular, protecting user's pattern in accessing these data has become a big concern. ORAM constructions are promising solutions to this issue, but their application in practice has been impeded by the ...
- research-articleNovember 2013
No surprises: measuring intrusiveness of smartphone applications by detecting objective context deviations
WPES '13: Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic societyPages 291–296https://doi.org/10.1145/2517840.2517864We address the challenge of improving transparency for smartphone applications by creating tools that assesses privacy risk. Specifically, we invented a framework for qualitatively assessing and quantitatively measuring the intrusiveness of smartphone ...
- research-articleNovember 2013
Path ORAM: an extremely simple oblivious RAM protocol
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 299–310https://doi.org/10.1145/2508859.2516660We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme for small client storage known to date. We formally prove that Path ORAM ...
- research-articleOctober 2013
Effect of page frame allocation pattern on bank conflicts in multi-core systems
RACS '13: Proceedings of the 2013 Research in Adaptive and Convergent SystemsPages 467–472https://doi.org/10.1145/2513228.2513306Multi-core systems equip a huge size of main memory that consists of a large number memory banks. To fully utilize the capability of multi-core, memory banks can be accessed by multiple cores in parallel without bank conflicts that cause significant ...
- posterJune 2013
CUPL: a compile-time uncoalesced memory access pattern locator for CUDA
ICS '13: Proceedings of the 27th international ACM conference on International conference on supercomputingPages 459–460https://doi.org/10.1145/2464996.2467288Coalesced memory access patterns in CUDA yields high performance but achieving such patterns in an application can be tedious. We propose a tool, CUPL, which locates uncoalesced access patterns (UCAP) in a given kernel at compile-time. CUPL does static ...
- research-articleMay 2013
Understanding data characteristics and access patterns in a cloud storage system
CCGRID '13: Proceedings of the 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid ComputingPages 327–334https://doi.org/10.1109/CCGrid.2013.11Understanding the inherent system characteristics is crucial to the design and optimization of cloud storage system, and few studies have systematically investigated its data characteristics and access patterns. This paper presents an analysis of file ...
- research-articleMay 2013
APRICOD: An access-pattern-driven distributed caching middleware for fast content discovery of noncontinuous media access
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Volume 9, Issue 2Article No.: 15, Pages 1–24https://doi.org/10.1145/2457450.2457457Content discovery is a major source of latency in peer-to-peer (P2P) media streaming systems, especially in the presence of noncontinuous user access, such as random seek in Video-on-Demand (VoD) streaming and teleportation in a Networked Virtual ...
- ArticleSeptember 2012
BWCC: A FS-Cache Based Cooperative Caching System for Network Storage System
CLUSTER '12: Proceedings of the 2012 IEEE International Conference on Cluster ComputingPages 546–550https://doi.org/10.1109/CLUSTER.2012.41A cooperative caching system, using disks as its cache media, is proposed for network storage system. This system is called Blue Whale Cooperative Caching System (BWCC). Through sharing the cached data among clients of cluster file system, the load on ...
- research-articleJune 2011
Matching cache access behavior and bit error pattern for high performance low Vcc L1 cache
DAC '11: Proceedings of the 48th Design Automation ConferencePages 978–983https://doi.org/10.1145/2024724.2024940Cache is a roadblock towards low supply voltage (Vcc). It is mainly because low Vcc incurs process variation-induced bit errors in large SRAM in cache. Existing approaches for low Vcc cache suffer from low performance due to reduced effective capacity, ...
- ArticleMay 2011
Small Files Problem in Parallel File System
NCIS '11: Proceedings of the 2011 International Conference on Network Computing and Information Security - Volume 02Pages 227–232https://doi.org/10.1109/NCIS.2011.143Parallel file systems suffer performance degradation of small files generated by many workloads. We provide the systematic analysis of the small files problem from aspects of both parallel file system architecture and workload characteristics. Based on ...