2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS) 2018
DOI: 10.1109/icdcs.2018.00053
|View full text |Cite
|
Sign up to set email alerts
|

CYCLOSA: Decentralizing Private Web Search through SGX-Based Browser Extensions

Abstract: By regularly querying Web search engines, users (unconsciously) disclose large amounts of their personal data as part of their search queries, among which some might reveal sensitive information (e.g. health issues, sexual, political or religious preferences). Several solutions exist to allow users querying search engines while improving privacy protection. However, these solutions suffer from a number of limitations: some are subject to user re-identification attacks, while others lack scalability or are unab… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
3

Relationship

2
8

Authors

Journals

citations
Cited by 23 publications
(10 citation statements)
references
References 29 publications
0
10
0
Order By: Relevance
“…Several works have been proposed, in the literature, to preserve privacy and minimize the amount of data collected by service providers while providing services tailored to user proiles [3,4,11,13,19,20], [16] and [17].…”
Section: Related Workmentioning
confidence: 99%
“…Several works have been proposed, in the literature, to preserve privacy and minimize the amount of data collected by service providers while providing services tailored to user proiles [3,4,11,13,19,20], [16] and [17].…”
Section: Related Workmentioning
confidence: 99%
“…Our work builds on the SCONE framework. Intel SGX has become available in clouds [36,49], unleashing a plethora of services to be ported, including Web search [72], actor framework [76], storage [15,52], leases [85], monitoring and profilers [14,51], software update [70], FaaS [88], networking [86,87], and data analytics systems [57,77,100].…”
Section: Related Workmentioning
confidence: 99%
“…In such case, users are responsible for using appropriate proxies that can conceal the origin of the request. One approach to hide the identities is by using peer-to-peer relay networks backed by enclaves [33]. Also, it is a requirement to only communicate with the cloud storage using encrypted connections.…”
Section: ) a Note On Revocationmentioning
confidence: 99%