Danny Harnik  Danny Harnik photo       

contact information

Researcher in Cloud Storage Group
IBM Haifa Lab, Tel-Aviv site



Estimating Unseen Deduplication - from Theory to Practice
Danny Harnik, Ety Khaitzin, Dmitry Sotnikov
14th USENIX Conference on File and Storage Technologies, FAST 2016., pp. 277-290


SDGen: Mimicking Datasets for Content Generation in Storage Benchmarks.
Raul Gracia Tinedo, Danny Harnik, Dalit Naor, Dmitry Sotnikov, Sivan Toledo, Aviad Zuck
13th USENIX Conference on File and Storage Technologies, FAST 2015


Compression and SSDs: Where and How?
Aviad Zuck, Sivan Toledo, Dmitry Sotnikov, Danny Harnik
2nd Workshop on Interactions of NVM/Flash with Operating Systems and Workloads, INFLOW '14, 2014

A Fast Implementation of Deflate
Danny Harnik, Ety Khaitzin, Dmitry Sotnikov and Shai Tahar
Data Compression Conference, DCC, pp. 223--232, 2014

The Case for Sampling on Very Large File Systems
George Goldberg, Danny Harnik, Dmitry Sotnikov
The 30th Conference on Mass Storage Systems and Technologies (MSST14), 2014


To Zip or not to Zip: Effective Resource Usage for Real-Time Compression
Danny Harnik, Ronen Kat, Oded Margalit, Dmitry Sotnikov, Avishay Traeger
FAST 2013, pp. 229--242


Similarity Based Deduplication with Small Data Chunks.
Lior Aronovich, Ron Asher, Danny Harnik, Michael Hirsch, Shmuel Tomi Klein, Yair Toaff
The Prague Stringology Conference 2012

Data intensive storage services on clouds: Limitations, challenges and enablers
Elliot K Kolodner, A Shulman-Peleg, D Naor, P Brand, M Dao, A Eckert, SV Gogouvitis, D Harnik, MC Jaeger, D Kyriazis, others
European Research Activities in Cloud Computing, D. Petcu and JL Vazquez-Poletti, Eds. Cambridge Scholars Publishing, 68--96, 2012

Estimation of Deduplication Ratios in Large Data Sets
Danny Harnik, Oded Margalit, Dalit Naor, Dmitry Sotnikov, Gil Vernik
The 28th Conference on Mass Storage Systems and Technologies (MSST12), pp. 1--11, 2012


Secure Access Mechanism for Cloud Storage
Danny Harnik, Elliot K Kolodner, Shahar Ronen, Julian Satran, Alexandra Shulman-Peleg, Sivan Tal
Scalable Computing: Practice and Experience 12(3), 2011

A cloud environment for data-intensive storage services
Elliot K Kolodner, Sivan Tal, Dimosthenis Kyriazis, Dalit Naor, Miriam Allalouf, Lucia Bonelli, Per Brand, Albert Eckert, Erik Elmroth, Spyridon V Gogouvitis, others
Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on, pp. 357--366

Semantic security under related-key attacks and applications
Benny Applebaum, Danny Harnik, Yuval Ishai
Innovations in Computer Science-ICS2011, 45--60

Proofs of ownership in remote storage systems
Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg
Proceedings of the 18th ACM conference on Computer and communications security, pp. 491--500, 2011

On the Power of the Randomized Iterate
Iftach Haitner, Danny Harnik, Omer Reingold
SIAM Journal on Computing 40(6), 1486--1528, SIAM, 2011
Best Paper Award at CRYPTO 2006


Side channels in cloud services, the case of deduplication in cloud storage
Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg
IEEE Security \& Privacy 8(6), 40--47, 2010

On the compressibility of NP instances and cryptographic applications
Danny Harnik, Moni Naor
SIAM Journal on Computing 39(5), 1667--1713, SIAM, 2010


Low power mode in cloud storage systems
Danny Harnik, Dalit Naor, Itai Segall
Parallel \& Distributed Processing, 2009. IPDPS 2009. IEEE International Symposium on, pp. 1--8, IEEE


Saving private randomness in one-way functions and pseudorandom generators
Nenad Dedi\'c, Danny Harnik, Leonid Reyzin
Proceedings of the 5th conference on Theory of cryptography, pp. 607--625, Springer, 2008

OT-combiners via secure computation
Danny Harnik, Yuval Ishai, Eyal Kushilevitz, Jesper Nielsen
Proceedings of the 5th conference on Theory of cryptography, pp. 393--411, Springer, 2008


How many oblivious transfers are needed for secure multiparty computation?
D Harnik, Y Ishai, E Kushilevitz
Advances in Cryptology-CRYPTO 2007, 284--302, Springer

Constant-round oblivious transfer in the bounded storage model
Y Z Ding, D Harnik, A Rosen, R Shaltiel
Journal of Cryptology 20(2), 165--202, Springer, 2007


Completeness in two-party secure computation: a computational view
D Harnik, M Naor, O Reingold, A Rosen
Journal of Cryptology 19(4), 521--552, Springer, 2006

On everlasting security in the hybrid bounded storage model
D Harnik, M Naor
Automata, Languages and Programming, 192--203, Springer, 2006

Efficient pseudorandom generators from exponentially hard one-way functions
I Haitner, D Harnik, O Reingold
Automata, Languages and Programming, 228--239, Springer, 2006
Best Paper Award for Cryptography track at ICALP


On robust combiners for oblivious transfer and other primitives
D Harnik, J Kilian, M Naor, O Reingold, A Rosen
Advances in Cryptology--EUROCRYPT 2005, 96--113, Springer


Higher lower bounds on monotone size
D Harnik, R Raz
Proceedings of the thirty-second annual ACM symposium on Theory of computing, pp. 387, 2000