Alina Oprea | Carnegie Mellon University (original) (raw)

Alina Oprea

Uploads

Papers by Alina Oprea

Research paper thumbnail of Secure Key-Updating for Lazy Revocation

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Lazy Revocation in Cryptographic File Systems

Bookmarks Related papers MentionsView impact

Research paper thumbnail of HAIL: a high-availability and integrity layer for cloud storage

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Efficient software implementations of large finite fields GF (2 n ) for secure storage applications

ACM Transactions on Storage, 2012

Bookmarks Related papers MentionsView impact

Research paper thumbnail of How to tell if your cloud files are vulnerable to drive crashes

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Securing a Remote Terminal Application with a Mobile Trusted Device

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Securing a Remote Terminal Application with a Mobile Trusted Device

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Securing a Remote Terminal Application with a Mobile Trusted Device

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Automatic Generation of Two-Party Computations (Extended Abstract

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Iris: A Scalable Cloud File System with Efficient Integrity Checks

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Authentic Time-Stamps for Archival Storage

We study the problem of authenticating the content and creation time of documents generated by an... more We study the problem of authenticating the content and creation time of documents generated by an organization and retained in archival storage. Recent regulations (e.g., the Sarbanes-Oxley act and the Securities and Exchange Commission rule) mandate secure retention of important business records for several years. We provide a mechanism to authenticate bulk repositories of archived documents. In our approach, a space efficient local data structure encapsulates a full document repository in a short (e.g., 32-byte) digest. Periodically registered with a trusted party, these commitments enable compact proofs of both document creation time and content integrity. The data structure, an append-only persistent authenticated dictionary, allows for efficient proofs of existence and non-existence, improving on state-of-the-art techniques. We confirm through an experimental evaluation with the Enron email corpus its feasibility in practice.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Proofs of retrievability: theory and implementation

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Space-Efficient Block Storage Integrity

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Hourglass Schemes: How to Prove that Cloud Files Are Encrypted

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Clean-Slate Look at Disk Scrubbing

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Automatic generation of two-party computations

Bookmarks Related papers MentionsView impact

Research paper thumbnail of HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Integrity Checking in Cryptographic File Systems with Constant Trusted Storage

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Private Keyword-Based Push and Pull with Applications to Anonymous Communication

We propose a new keyword-based Private Information Retrieval (PIR) model that allows private modi... more We propose a new keyword-based Private Information Retrieval (PIR) model that allows private modification of the database from which information is requested. In our model, the database is distributed over n servers, any one of which can act as a transparent interface for clients. We present protocols that support operations for accessing data, focusing on privately appending labelled records to the database (push) and privately retrieving the next unseen record appended under a given label (pull). The communication complexity between the client and servers is independent of the number of records in the database (or more generally, the number of previous push and pull operations) and of the number of servers. Our scheme also supports access control oblivious to the database servers by implicitly including a public key in each push, so that only the party holding the private key can retrieve the record via pull. To our knowledge, this is the first system that achieves the following properties: private database modification, private retrieval of multiple records with the same keyword, and oblivious access control. We also provide a number of extensions to our protocols and, as a demonstrative application, an unlinkable anonymous communication service using them.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of On Consistency of Encrypted Files

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Secure Key-Updating for Lazy Revocation

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Lazy Revocation in Cryptographic File Systems

Bookmarks Related papers MentionsView impact

Research paper thumbnail of HAIL: a high-availability and integrity layer for cloud storage

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Efficient software implementations of large finite fields GF (2 n ) for secure storage applications

ACM Transactions on Storage, 2012

Bookmarks Related papers MentionsView impact

Research paper thumbnail of How to tell if your cloud files are vulnerable to drive crashes

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Securing a Remote Terminal Application with a Mobile Trusted Device

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Securing a Remote Terminal Application with a Mobile Trusted Device

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Securing a Remote Terminal Application with a Mobile Trusted Device

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Automatic Generation of Two-Party Computations (Extended Abstract

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Iris: A Scalable Cloud File System with Efficient Integrity Checks

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Authentic Time-Stamps for Archival Storage

We study the problem of authenticating the content and creation time of documents generated by an... more We study the problem of authenticating the content and creation time of documents generated by an organization and retained in archival storage. Recent regulations (e.g., the Sarbanes-Oxley act and the Securities and Exchange Commission rule) mandate secure retention of important business records for several years. We provide a mechanism to authenticate bulk repositories of archived documents. In our approach, a space efficient local data structure encapsulates a full document repository in a short (e.g., 32-byte) digest. Periodically registered with a trusted party, these commitments enable compact proofs of both document creation time and content integrity. The data structure, an append-only persistent authenticated dictionary, allows for efficient proofs of existence and non-existence, improving on state-of-the-art techniques. We confirm through an experimental evaluation with the Enron email corpus its feasibility in practice.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Proofs of retrievability: theory and implementation

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Space-Efficient Block Storage Integrity

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Hourglass Schemes: How to Prove that Cloud Files Are Encrypted

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Clean-Slate Look at Disk Scrubbing

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Automatic generation of two-party computations

Bookmarks Related papers MentionsView impact

Research paper thumbnail of HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Integrity Checking in Cryptographic File Systems with Constant Trusted Storage

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Private Keyword-Based Push and Pull with Applications to Anonymous Communication

We propose a new keyword-based Private Information Retrieval (PIR) model that allows private modi... more We propose a new keyword-based Private Information Retrieval (PIR) model that allows private modification of the database from which information is requested. In our model, the database is distributed over n servers, any one of which can act as a transparent interface for clients. We present protocols that support operations for accessing data, focusing on privately appending labelled records to the database (push) and privately retrieving the next unseen record appended under a given label (pull). The communication complexity between the client and servers is independent of the number of records in the database (or more generally, the number of previous push and pull operations) and of the number of servers. Our scheme also supports access control oblivious to the database servers by implicitly including a public key in each push, so that only the party holding the private key can retrieve the record via pull. To our knowledge, this is the first system that achieves the following properties: private database modification, private retrieval of multiple records with the same keyword, and oblivious access control. We also provide a number of extensions to our protocols and, as a demonstrative application, an unlinkable anonymous communication service using them.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of On Consistency of Encrypted Files

Bookmarks Related papers MentionsView impact

Log In