Cetin Sahin

Learn More
—We consider oblivious storage systems hiding both the contents of the data as well as access patterns from an un-trusted cloud provider. We target a scenario where multiple users from a trusted group (e.g., corporate employees) asynchronously access and edit potentially overlapping data sets through a trusted proxy mediating client-cloud communication. The(More)
  • 1