Skip to main content

Showing 1–4 of 4 results for author: Shafagh, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2107.03726  [pdf, other

    cs.CR

    Zeph: Cryptographic Enforcement of End-to-End Data Privacy

    Authors: Lukas Burkhalter, Nicolas Küchler, Alexander Viand, Hossein Shafagh, Anwar Hithnawi

    Abstract: As increasingly more sensitive data is being collected to gain valuable insights, the need to natively integrate privacy controls in data analytics frameworks is growing in importance. Today, privacy controls are enforced by data curators with full access to data in the clear. However, a plethora of recent data breaches show that even widely trusted service providers can be compromised. Additional… ▽ More

    Submitted 8 July, 2021; originally announced July 2021.

    Comments: 20 pages, extended version of a paper published at OSDI 2021

  2. arXiv:1811.03457  [pdf, other

    cs.CR

    TimeCrypt: Encrypted Data Stream Processing at Scale with Cryptographic Access Control

    Authors: Lukas Burkhalter, Anwar Hithnawi, Alexander Viand, Hossein Shafagh, Sylvia Ratnasamy

    Abstract: A growing number of devices and services collect detailed time series data that is stored in the cloud. Protecting the confidentiality of this vast and continuously generated data is an acute need for many applications in this space. At the same time, we must preserve the utility of this data by enabling authorized services to securely and selectively access and run analytics. This paper presents… ▽ More

    Submitted 13 March, 2020; v1 submitted 8 November, 2018; originally announced November 2018.

  3. arXiv:1806.02057  [pdf, other

    cs.CR

    Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams

    Authors: Hossein Shafagh, Lukas Burkhalter, Anwar Hithnawi, Sylvia Ratnasamy

    Abstract: This paper presents Droplet, a decentralized data access control service. Droplet enables data owners to securely and selectively share their encrypted data while guaranteeing data confidentiality in the presence of unauthorized parties and compromised data servers. Droplet's contribution lies in coupling two key ideas: (i) a cryptographically-enforced access control construction for encrypted dat… ▽ More

    Submitted 21 January, 2021; v1 submitted 6 June, 2018; originally announced June 2018.

    Journal ref: USENIX Security 2020

  4. arXiv:1705.08230  [pdf, other

    cs.DC

    Towards Blockchain-based Auditable Storage and Sharing of IoT Data

    Authors: Hossein Shafagh, Lukas Burkhalter, Anwar Hithnawi, Simon Duquennoy

    Abstract: Today the cloud plays a central role in storing, processing, and distributing data. Despite contributing to the rapid development of IoT applications, the current IoT cloud-centric architecture has led into a myriad of isolated data silos that hinders the full potential of holistic data-driven analytics within the IoT. In this paper, we present a blockchain-based design for the IoT that brings a d… ▽ More

    Submitted 14 November, 2017; v1 submitted 22 May, 2017; originally announced May 2017.