[go: up one dir, main page]

Carbunar et al., 2011 - Google Patents

Write-once read-many oblivious RAM

Carbunar et al., 2011

View PDF
Document ID
10910479492838630377
Author
Carbunar B
Sion R
Publication year
Publication venue
IEEE Transactions on Information Forensics and Security

External Links

Snippet

We introduce WORM-ORAM, a first mechanism that combines Oblivious RAM (ORAM) access privacy and data confidentiality with Write-Once Read-Many (WORM) regulatory data retention guarantees. Clients can outsource their database to a server with full confidentiality …
Continue reading at users.cis.fiu.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Similar Documents

Publication Publication Date Title
Yuan et al. Secure cloud data deduplication with efficient re-encryption
Liu et al. Nonlinear order preserving index for encrypted database query in service cloud environments
Storer et al. POTSHARDS: secure long-term storage without encryption
US10686764B2 (en) Executable coded cipher keys
Falk et al. Durasift: A robust, decentralized, encrypted database supporting private searches with complex policy controls
Shekhtman et al. EngraveChain: Tamper-proof distributed log system
Laptyeva et al. The weak-password problem: Chaos, criticality, and encrypted p-CAPTCHAs
Chen et al. A database encryption scheme for enhanced security and easy sharing
Carbunar et al. Write-once read-many oblivious RAM
Virvilis et al. A cloud provider-agnostic secure storage protocol
Idrus et al. Blockchain-based security for cloud data storage
Dave et al. Securing SQL with access control for database as a service model
Ganorkar et al. An information security scheme for cloud based environment using 3DES encryption algorithm
Frank et al. Percival: A searchable secret-split datastore
Yao et al. An Effective Privacy‐Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation
Carbunar et al. Regulatory compliant oblivious RAM
Raja et al. Dynamic Remote Data Auditing using Privacy-Preserving Auditing Protocol in Cloud Environment
Praveen et al. On the Design of a Searchable Encryption Protocol for Keyword Search using Proactive Secret Sharing
Li et al. Accelerating secure and verifiable data deletion in cloud storage via SGX and blockchain
Shang et al. Controlling data disclosure in computational PIR protocols
Coles et al. Expert SQL server 2008 encryption
Olimid et al. On the security of a backup technique for database systems based on threshold sharing
Bhat Enhancing Cloud Storage Security and Efficiency through Integrated Ranked Keyword Search and Cryptographic Techniques: A Multi-Client Approach
Sridhar et al. Querying methods of Encrypted Cloud Data
Hua et al. Enabling Secure Auditing and Deduplication in Multi-replica Cloud Storage