Skip to main content

Showing 1–3 of 3 results for author: Maffre, J

.
  1. arXiv:2407.12623  [pdf, other

    cs.DC

    LSKV: A Confidential Distributed Datastore to Protect Critical Data in the Cloud

    Authors: Andrew Jeffery, Julien Maffre, Heidi Howard, Richard Mortier

    Abstract: Software services are increasingly migrating to the cloud, requiring trust in actors with direct access to the hardware, software and data comprising the service. A distributed datastore storing critical data sits at the core of many services; a prime example being etcd in Kubernetes. Trusted execution environments can secure this data from cloud providers during execution, but it is complex to bu… ▽ More

    Submitted 17 July, 2024; originally announced July 2024.

  2. arXiv:2310.11559  [pdf, other

    cs.CR cs.DC

    Confidential Consortium Framework: Secure Multiparty Applications with Confidentiality, Integrity, and High Availability

    Authors: Heidi Howard, Fritz Alder, Edward Ashton, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, Antoine Delignat-Lavaud, Cedric Fournet, Andrew Jeffery, Matthew Kerner, Fotios Kounelis, Markus A. Kuppe, Julien Maffre, Mark Russinovich, Christoph M. Wintersteiger

    Abstract: Confidentiality, integrity protection, and high availability, abbreviated to CIA, are essential properties for trustworthy data systems. The rise of cloud computing and the growing demand for multiparty applications however means that building modern CIA systems is more challenging than ever. In response, we present the Confidential Consortium Framework (CCF), a general-purpose foundation for deve… ▽ More

    Submitted 17 October, 2023; originally announced October 2023.

    Comments: 16 pages, 9 figures. To appear in the Proceedings of the VLDB Endowment, Volume 17

  3. arXiv:2105.13116  [pdf, other

    cs.DC

    IA-CCF: Individual Accountability for Permissioned Ledgers

    Authors: Alex Shamis, Peter Pietzuch, Miguel Castro, Cédric Fournet, Edward Ashton, Amaury Chamayou, Sylvan Clebsch, Antoine Delignat-Lavaud, Matthew Kerner, Julien Maffre, Manuel Costa, Mark Russinovich

    Abstract: Permissioned ledger systems allow a consortium of members that do not trust one another to execute transactions safely on a set of replicas. Such systems typically use Byzantine fault tolerance (BFT) protocols to distribute trust, which only ensures safety when fewer than 1/3 of the replicas misbehave. Providing guarantees beyond this threshold is a challenge: current systems assume that the ledge… ▽ More

    Submitted 8 March, 2022; v1 submitted 27 May, 2021; originally announced May 2021.