Introduction to algorithms
Software protection and simulation on oblivious RAMs
Journal of the ACM (JACM)
Journal of the ACM (JACM)
Building a high-performance, programmable secure coprocessor
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on computer network security
Handbook of Applied Cryptography
Handbook of Applied Cryptography
WebALPS Implementation and Performance Analysis: Using Trusted Co-servers to Enhance Privacy and Security of Web Interactions
Crowds: Anonymity for Web Transactions
Crowds: Anonymity for Web Transactions
Improving DES coprocessor throughput for short operations
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Computationally private information retrieval with polylogarithmic communication
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Itinerant Agents for Mobile Computing
IEEE Communications Surveys & Tutorials
Repudiative information retrieval
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Outbound Authentication for Programmable Secure Coprocessors
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
Proceedings of the 11th USENIX Security Symposium
WebALPS: a survey of E-commerce privacy and security applications
ACM SIGecom Exchanges
Terra: a virtual machine-based platform for trusted computing
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Blind sales in electronic commerce
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
Protecting Client Privacy with Trusted Computing at the Server
IEEE Security and Privacy
ACM Transactions on Information and System Security (TISSEC)
Improving DES coprocessor throughput for short operations
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Improving DES coprocessor throughput for short operations
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Enabling access-privacy for random walk based data analysis applications
Data & Knowledge Engineering
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Information Security and Cryptology
An Efficient PIR Construction Using Trusted Hardware
ISC '08 Proceedings of the 11th international conference on Information Security
Wake up or fall asleep-value implication of trusted computing
Information Technology and Management
Prototyping an armored data vault rights management on Big Brother's computer
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Almost optimal private information retrieval
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
New paradigm of inference control with trusted computing
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Secure coprocessor-based private information retrieval without periodical preprocessing
AISC '10 Proceedings of the Eighth Australasian Conference on Information Security - Volume 105
Reconstruction of falsified computer logs for digital forensics investigations
AISC '10 Proceedings of the Eighth Australasian Conference on Information Security - Volume 105
Small, stupid, and scalable: secure computing with faerieplay
Proceedings of the fifth ACM workshop on Scalable trusted computing
A taxonomy of approaches to preserve location privacy in location-based services
International Journal of Computational Science and Engineering
Towards accountability for electronic patient records
CBMS'03 Proceedings of the 16th IEEE conference on Computer-based medical systems
TrustedDB: a trusted hardware based database with privacy and data confidentiality
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Privacy-Preserving search and updates for outsourced tree-structured data on untrusted servers
iTrust'05 Proceedings of the Third international conference on Trust Management
Private information retrieval using trusted hardware
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Single round access privacy on outsourced storage
Proceedings of the 2012 ACM conference on Computer and communications security
Ensuring Correctness, Completeness, and Freshness for Outsourced Tree-Indexed Data
Information Resources Management Journal
Path ORAM: an extremely simple oblivious RAM protocol
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Shroud: ensuring private access to large-scale data in the data center
FAST'13 Proceedings of the 11th USENIX conference on File and Storage Technologies
Hi-index | 0.00 |
What does it take to implement a server that provides access to records in a large database, in a way that ensures that this access is completely private--even to the operator of this server? In this paper, we examine the question: Using current commercially available technology, is it practical to build such a server, for real databases of realistic size, that offers reasonable performance--scaling well, parallelizing well, working with the current client infrastructure, and enabling server operators of otherwise unknown credibility to prove their service has these privacy properties? We consider this problem in the light of commercially available secure coprocessors--whose internal memory is still much, much smaller than the typical database size--and construct an algorithm that both provides asymptotically optimal performance and also promises reasonable performance in real implementations. Preliminary prototypes support this analysis, but leave many areas for further work.