Carbunar et al., 2011 - Google Patents
Write-once read-many oblivious RAMCarbunar et al., 2011
View PDF- Document ID
- 10910479492838630377
- Author
- Carbunar B
- Sion R
- Publication year
- Publication venue
- IEEE Transactions on Information Forensics and Security
External Links
Snippet
We introduce WORM-ORAM, a first mechanism that combines Oblivious RAM (ORAM) access privacy and data confidentiality with Write-Once Read-Many (WORM) regulatory data retention guarantees. Clients can outsource their database to a server with full confidentiality …
- 230000014759 maintenance of location 0 abstract description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yuan et al. | Secure cloud data deduplication with efficient re-encryption | |
Liu et al. | Nonlinear order preserving index for encrypted database query in service cloud environments | |
Storer et al. | POTSHARDS: secure long-term storage without encryption | |
US10686764B2 (en) | Executable coded cipher keys | |
Falk et al. | Durasift: A robust, decentralized, encrypted database supporting private searches with complex policy controls | |
Shekhtman et al. | EngraveChain: Tamper-proof distributed log system | |
Laptyeva et al. | The weak-password problem: Chaos, criticality, and encrypted p-CAPTCHAs | |
Chen et al. | A database encryption scheme for enhanced security and easy sharing | |
Carbunar et al. | Write-once read-many oblivious RAM | |
Virvilis et al. | A cloud provider-agnostic secure storage protocol | |
Idrus et al. | Blockchain-based security for cloud data storage | |
Dave et al. | Securing SQL with access control for database as a service model | |
Ganorkar et al. | An information security scheme for cloud based environment using 3DES encryption algorithm | |
Frank et al. | Percival: A searchable secret-split datastore | |
Yao et al. | An Effective Privacy‐Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation | |
Carbunar et al. | Regulatory compliant oblivious RAM | |
Raja et al. | Dynamic Remote Data Auditing using Privacy-Preserving Auditing Protocol in Cloud Environment | |
Praveen et al. | On the Design of a Searchable Encryption Protocol for Keyword Search using Proactive Secret Sharing | |
Li et al. | Accelerating secure and verifiable data deletion in cloud storage via SGX and blockchain | |
Shang et al. | Controlling data disclosure in computational PIR protocols | |
Coles et al. | Expert SQL server 2008 encryption | |
Olimid et al. | On the security of a backup technique for database systems based on threshold sharing | |
Bhat | Enhancing Cloud Storage Security and Efficiency through Integrated Ranked Keyword Search and Cryptographic Techniques: A Multi-Client Approach | |
Sridhar et al. | Querying methods of Encrypted Cloud Data | |
Hua et al. | Enabling Secure Auditing and Deduplication in Multi-replica Cloud Storage |