نتایج جستجو برای: oram syndrome

تعداد نتایج: 622110  

2014
Ka Yang Daji Qiao Jinsheng Zhang Wensheng Zhang

In outsourced data services, revealing users’ data access pattern may lead to the exposure of a wide range of sensitive information even if data is encrypted. Oblivious RAM has been a well-studied provable solution to access pattern preservation. However, it is not resilient to attacks towards data integrity from the users or the server. In this paper, we study the problem of protecting access ...

2016
Seny Kamara

In the first lecture we covered—at a high level—several ways to search on encrypted data. We also mentioned that for all solutions, there is a tradeoff between efficiency, security and expressiveness. Here we will cover one extreme of the solution space: the zero-leakage or leakage-free solutions. Note that by zero-leakage we do not mean that nothing is leaked. Rather, what we mean is that what...

Journal: :Human reproduction 2004
U Ulrich J Schrickel C Dorn O Richter T Lewalter B Lüderitz K Rhiem

We report on the association of Mayer-von Rokitansky-Küster-Hauser syndrome (MRKHS) with a unique form of Holt-Oram syndrome (HOS) with an aorto-pulmonary window. A 24-year-old Turkish woman was referred to our hospital because of primary amenorrhoea. Both her vagina and uterus were absent, and the diagnosis of MRKHS was established. Laparoscopic creation of a neovagina by the modified Vecchiet...

Journal: :PVLDB 2016
Zhao Chang Dong Xie Feifei Li

Many companies choose the cloud as their data and IT infrastructure platform. The remote access of the data brings the issue of trust. Despite the use of strong encryption schemes, adversaries can still learn valuable information regarding encrypted data by observing the data access patterns. To that end, one can hide the access patterns, which may leak sensitive information, using Oblivious RA...

2011
Dan Boneh David Mazieres Raluca Ada Popa David Mazières

Remote storage of data has become an increasingly attractive and advantageous option, especially due to cloud systems. While encryption protects the data, it does not hide the access pattern to the data. A natural solution is to access remote storage using an Oblivious RAM (ORAM) which provably hides all access patterns. While ORAM is asymptotically efficient, the best existing scheme (Pinkas a...

2016
Adam J. Aviv Seung Geol Choi Travis Mayberry Daniel S. Roche

Oblivious RAM (ORAM) protocols are powerful techniques that hide a client’s data as well as access patterns from untrusted service providers. We present an oblivious cloud storage system, ObliviSync, that specifically targets one of the most widely-used personal cloud storage paradigms: synchronization and backup services, popular examples of which are Dropbox, iCloud Drive, and Google Drive. T...

Journal: :IEICE Transactions 2014
Yuto Nakano Shinsaku Kiyomoto Yutaka Miyake Kouichi Sakurai

Oblivious RAM (ORAM) schemes, the concept introduced by Goldreich and Ostrovsky, are very useful technique for protecting users’ privacy when storing data in remote untrusted servers and running software on untrusted systems. However they are usually considered impractical due to their huge overhead. In order to reduce overhead, many improvements have been presented. Thanks to these improvement...

2017
T.-H. Hubert Chan Elaine Shi

An Oblivious Parallel RAM (OPRAM) provides a general method to simulate any Parallel RAM (PRAM) program, such that the resulting memory access patterns leak nothing about secret inputs. OPRAM was originally proposed by Boyle et al. as the natural parallel counterpart of Oblivious RAM (ORAM), which was shown to have broad applications, e.g., in cloud outsourcing, secure processor design, and sec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید