Doquet: Differentially Oblivious Range and Join Queries with Private Data Structures

L Qiu, G Kellaris, N Mamoulis, K Nissim… - Proceedings of the VLDB …, 2023 - dl.acm.org
Most cloud service providers offer limited data privacy guarantees, discouraging clients from
using them for managing their sensitive data. Cloud providers may use servers with Trusted …

Graphos: Towards oblivious graph processing

JG Chamani, I Demertzis, D Papadopoulos… - Cryptology ePrint …, 2024 - eprint.iacr.org
We propose GraphOS, a system that allows a client that owns a graph database to
outsource it to an untrusted server for storage and querying. It relies on doubly-oblivious …

SEDCPT: A secure and efficient Dynamic Searchable Encryption scheme with cluster padding assisted by TEE

B Li, F Zhou, Q Wang, J Xu, D Feng - Journal of Systems Architecture, 2024 - Elsevier
Abstract Dynamic Searchable Symmetric Encryption (DSSE), which enables users to search
and update encrypted data on an untrusted server without decryption, is a proven method …

Shielding graph for eXact analytics with SGX

M Du, P Jiang, Q Wang, SSM Chow… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Graphs nicely capture data from various domains, allowing the computations of many
analytic tasks via graph queries. Graphs of real-world data are often large, albeit useful, and …

No Forking Way: Detecting Cloning Attacks on Intel SGX Applications

S Briongos, G Karame, C Soriente… - Proceedings of the 39th …, 2023 - dl.acm.org
Forking attacks against TEEs like Intel SGX can be carried out either by rolling back the
application to a previous state, or by cloning the application and by partitioning its inputs …

Dynamic Searchable Symmetric Encryption With Strong Security and Robustness

H Dou, Z Dan, P Xu, W Wang, S Xu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Dynamic Searchable Symmetric Encryption (DSSE) is a prospective technique in the field of
cloud storage for secure search over encrypted data. A DSSE client can issue update …

Multi-user privacy-preserving image search in distributed cloud computing

Z Zhang, F Zhou, Y Wang - Computers and Electrical Engineering, 2024 - Elsevier
Cloud-based image search has emerged as a research focus, but security and privacy
concerns limit its application. One secure solution is to encrypt the images before …

NEMO: Practical Distributed Boolean Queries With Minimal Leakage

J Li, R Zhang, J Wang, Y Xin… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Searchable symmetric encryption (SSE) schemes allow a client to store encrypted data with
a storage provider and retrieve corresponding documents without revealing the content or …

OLBS: Oblivious Location-Based Services

J Han, W Susilo, N Li, X Huang - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the growing use of mobile devices, location-based services (LBS) are becoming
increasingly popular. BLS deliver accurate services to individuals according to their …

Towards practical oblivious join processing

Z Chang, D Xie, S Wang, F Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In cloud computing, remote accesses over the cloud data inevitably bring the issue of trust.
Despite strong encryption schemes, adversaries can still learn sensitive information from …