Design space exploration and optimization of path oblivious RAM in secure processors

Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One paradigm to achieve data privacy is to use tamper-resistant processors, inside which users' private data is decrypted and computed upon. These processors need to interact with untrusted external...

Full description

Bibliographic Details
Main Authors: Ren, Ling (Contributor), Yu, Xiangyao (Contributor), Devadas, Srinivas (Contributor), Fletcher, Christopher Wardlaw (Contributor), Van Dijk, Marten (Contributor)
Other Authors: Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory (Contributor), Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science (Contributor)
Format: Article
Language:English
Published: Association for Computing Machinery (ACM), 2014-04-14T18:23:00Z.
Subjects:
Online Access:Get fulltext