Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024
Homomorphic Encryption and Collaborative Machine Learning for Secure Healthcare Analytics
- Bhomik M. Gandhi,
- Shruti B. Vaghadia,
- Malaram Kumhar,
- Rajesh Gupta,
- Nilesh Kumar Jadav,
- Jitendra Bhatia,
- Sudeep Tanwar,
- Abdulatif Alabdulatif
ABSTRACTWith the advent of the Internet of Things (IoT), the conventional healthcare system has evolved into a smart healthcare system, offering intelligent prognosis and diagnosis services. However, as the healthcare sector embraces technological ...
- research-articleMay 2024
Object-oriented Unified Encrypted Memory Management for Heterogeneous Memory Architectures
Proceedings of the ACM on Management of Data (PACMMOD), Volume 2, Issue 3Article No.: 155, Pages 1–29https://doi.org/10.1145/3654958In contemporary database applications, the demand for memory resources is intensively high. To enhance adaptability to varying resource needs and improve cost efficiency, the integration of diverse storage technologies within heterogeneous memory ...
- research-articleJanuary 2024
FFHE-SSC: a robust framework for performing statistical computation on encrypted data
International Journal of Computing Science and Mathematics (IJCSM), Volume 20, Issue 4Pages 308–324https://doi.org/10.1504/ijcsm.2024.143208In the field of data privacy and security, performing computations on encrypted data without compromising confidentiality presents a significant challenge. The fast fully homomorphic encryption for secure statistical computation (FFHE-SSC) framework, ...
- research-articleDecember 2023
TEE-based General-purpose Computational Backend for Secure Delegated Data Processing
Proceedings of the ACM on Management of Data (PACMMOD), Volume 1, Issue 4Article No.: 263, Pages 1–28https://doi.org/10.1145/3626757The increasing prevalence of data breaches necessitates robust data protection measures in computational tasks. Secure computation outsourcing (SCO) presents a viable solution by safeguarding the confidentiality of inputs and outputs in data processing ...
- research-articleDecember 2020
Mitigating Data-only Attacks by Protecting Memory-resident Sensitive Data
Digital Threats: Research and Practice (DTRAP), Volume 1, Issue 4Article No.: 20, Pages 1–26https://doi.org/10.1145/3419475Gaining reliable arbitrary code execution through the exploitation of memory corruption vulnerabilities is becoming increasingly more difficult in the face of modern exploit mitigations. Facing this challenge, adversaries have started shifting their ...
-
- research-articleJanuary 2021
An Analysis of Confidentiality Issues in Data Lakes
iiWAS '20: Proceedings of the 22nd International Conference on Information Integration and Web-based Applications & ServicesPages 168–177https://doi.org/10.1145/3428757.3429109A data lake is a relatively recent technology to maintain and allow access to voluminous and heterogeneous data sources. Governments, large corporations and startups have increasingly considered it for storing useful data and obtain valuable business ...
- research-articleMarch 2020
FridgeLock: Preventing Data Theft on Suspended Linux with Usable Memory Encryption
CODASPY '20: Proceedings of the Tenth ACM Conference on Data and Application Security and PrivacyPages 215–219https://doi.org/10.1145/3374664.3375747To secure mobile devices, such as laptops and smartphones, against unauthorized physical data access, employing Full Disk Encryption (FDE) is a popular defense. This technique is effective if the device is always shut down when unattended. However, ...
- research-articleDecember 2019
Mitigating data leakage by protecting memory-resident sensitive data
ACSAC '19: Proceedings of the 35th Annual Computer Security Applications ConferencePages 598–611https://doi.org/10.1145/3359789.3359815Gaining reliable arbitrary code execution through the exploitation of memory corruption vulnerabilities is becoming increasingly more difficult in the face of modern exploit mitigations. Facing this challenge, adversaries have started shifting their ...
- research-articleMay 2019
Secure Deduplication on Public Cloud Storage
ICBDC '19: Proceedings of the 4th International Conference on Big Data and ComputingPages 34–41https://doi.org/10.1145/3335484.3335502Public cloud storage is an important resource of modern computing. One important aspect is the potential to improve economic efficiency. It can be drastically increased by leveraging deduplication techniques. The authors of this paper aim to minimize ...
- research-articleApril 2019
A Lightweight and Secure Data Collection Serverless Protocol Demonstrated in an Active RFIDs Scenario
ACM Transactions on Embedded Computing Systems (TECS), Volume 18, Issue 3Article No.: 27, Pages 1–27https://doi.org/10.1145/3274667In the growing Internet of Things context, thousands of computing devices with various functionalities are producing data (from environmental sensors or other sources). However, they are also collecting, storing, processing and transmitting data to ...
- research-articleMarch 2019
Extracting Secrets from Encrypted Virtual Machines
CODASPY '19: Proceedings of the Ninth ACM Conference on Data and Application Security and PrivacyPages 221–230https://doi.org/10.1145/3292006.3300022AMD SEV is a hardware extension for main memory encryption on multi-tenant systems. SEV uses an on-chip coprocessor, the AMD Secure Processor, to transparently encrypt virtual machine memory with individual, ephemeral keys never leaving the coprocessor. ...
- research-articleFebruary 2019
E2SM: a security tool for adaptive cloud‐based service‐oriented applications
The issue of security in the distributed system landscape of a service‐oriented architecture (SOA) is a challenging one. No longer is it limited to a local application or an application domain, security must now work across a range of applications and ...
- research-articleJanuary 2019
Binomial logit regression and centralised agent stochastic optimisation for privacy preserved load balancing in cloud
International Journal of Information Systems and Change Management (IJISCM), Volume 11, Issue 1Pages 25–43https://doi.org/10.1504/ijiscm.2019.101647Load balancing and privacy preservation of data plays an important role in cloud. Few research works have been designed to perform load balancing on cloud server but, performance was not improved. In order to overcome such limitation, a binomial logit ...
- research-articleJanuary 2018
Enforcing authorizations while protecting access confidentiality1
Journal of Computer Security (JOCS), Volume 26, Issue 2Pages 143–175https://doi.org/10.3233/JCS-171004Cloud computing is the reference paradigm to provide data storage and management in a convenient and scalable manner. However, moving data to the cloud raises several issues, including the confidentiality of data and of accesses that are no more under the ...
- research-articleNovember 2017
Secure resource allocation for the SISO‐OFDM wiretap channel
IET Communications (CMU2), Volume 11, Issue 18Pages 2702–2712https://doi.org/10.1049/iet-com.2016.1468The broadcast nature of communication systems opens the possibility for attackers to eavesdrop the data and compromise data confidentiality. This study takes the information theoretic security at the physical layer of single‐input single‐output orthogonal ...
- research-articleSeptember 2017
Secure data types: a simple abstraction for confidentiality-preserving data analytics
SoCC '17: Proceedings of the 2017 Symposium on Cloud ComputingPages 479–492https://doi.org/10.1145/3127479.3129256Cloud computing offers a cost-efficient data analytics platform. However, due to the sensitive nature of data, many organizations are reluctant to analyze their data in public clouds. Both software-based and hardware-based solutions have been proposed ...
- research-articleMay 2017
SafeFS: a modular architecture for secure user-space file systems: one FUSE to rule them all
- Rogério Pontes,
- Dorian Burihabwa,
- Francisco Maia,
- João Paulo,
- Valerio Schiavoni,
- Pascal Felber,
- Hugues Mercier,
- Rui Oliveira
SYSTOR '17: Proceedings of the 10th ACM International Systems and Storage ConferenceArticle No.: 9, Pages 1–12https://doi.org/10.1145/3078468.3078480The exponential growth of data produced, the ever faster and ubiquitous connectivity, and the collaborative processing tools lead to a clear shift of data stores from local servers to the cloud. This migration occurring across different application ...
- research-articleMarch 2017
Data confidentiality in cloud-based pervasive system
ICC '17: Proceedings of the Second International Conference on Internet of things, Data and Cloud ComputingArticle No.: 185, Pages 1–6https://doi.org/10.1145/3018896.3056802Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing capabilities, smart devices need to ...
- research-articleDecember 2016
CoKey: fast token-based cooperative cryptography
ACSAC '16: Proceedings of the 32nd Annual Conference on Computer Security ApplicationsPages 314–323https://doi.org/10.1145/2991079.2991117Keys for symmetric cryptography are usually stored in RAM and therefore susceptible to various attacks, ranging from simple buffer overflows to leaks via cold boot, DMA or side channels. A common approach to mitigate such attacks is to move the keys to ...
- research-articleMay 2016
Privacy Preserving Distributed Permutation Test
SCC '16: Proceedings of the 4th ACM International Workshop on Security in Cloud ComputingPages 67–73https://doi.org/10.1145/2898445.2898450In this paper, we propose a privacy-preserving algorithm for two-party distributed permutation test for the difference of means. Our algorithm allows two parties to jointly perform a permutation test on the union of their data without revealing their ...