NewMCOS: Towards a Practical Multi-Cloud Oblivious Storage Scheme

作者: Zheli Liu , Bo Li , Yanyu Huang , Jin Li , Yang Xiang

DOI: 10.1109/TKDE.2019.2891581

关键词: ComputationComputer scienceShufflingEncryptionOblivious ramServerBandwidth (computing)Parallel computingCPU cache

摘要: Encryption alone is not enough to protect data privacy, because access pattern leaks some sensitive information. Oblivious RAM (ORAM), the solution this problem, still far from practical deployment for heavy storage and communication/ computation overhead. To reduce them, an insightful idea was proposed utilize non-colluding clouds shift client client-cloud communication clouds. The multi-cloud ORAM achieved $O$ O (1) bandwidth cost removed most of computation. In paper, we exploit “ disconnected operation ” design two-layer encryption further these overheads. Experiments show that our scheme, NewMCOS, significantly reduces evict cache size GB/MB KB level with about 2-3 times lower response time 20 percent savings in clouds, compared other schemes. Theoretically speaking, $O(\sqrt{N})$ ( N ) $O(ZK)$ Z K , where $N$ number real blocks, $K$ $2 2 ), $Z$ blocks uploaded eviction. By employing lazy eviction ”, write frequency reduced by $O(Z)$ shuffling $\Omega (Z\; \log Z)$ Ω log . Meanwhile, NewMCOS proved be secure.

参考文章(39)
Chang Liu, Xiao Shaun Wang, Kartik Nayak, Yan Huang, Elaine Shi, None, ObliVM: A Programming Framework for Secure Computation 2015 IEEE Symposium on Security and Privacy. pp. 359- 376 ,(2015) , 10.1109/SP.2015.29
Srinivas Devadas, Emil Stefanov, Ling Ren, Christopher Fletcher, Marten van Dijk, Xiangyao Yu, Elaine Shi, Path ORAM: An Extremely Simple Oblivious RAM Protocol Other repository. ,(2013)
Arvind Arasu, Ken Eguro, Manas Joglekar, Raghav Kaushik, Donald Kossmann, Ravi Ramamurthy, Transaction processing on confidential data using cipherbase international conference on data engineering. pp. 435- 446 ,(2015) , 10.1109/ICDE.2015.7113304
Ling Ren, Christopher Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten Van Dijk, Srinivas Devadas, None, Constants count: practical improvements to oblivious RAM usenix security symposium. pp. 415- 430 ,(2015)
Emil Stefanov, Jonathan Dautrich, Elaine Shi, Burst ORAM: minimizing ORAM response times for bursty access patterns usenix security symposium. pp. 749- 764 ,(2014)
Tarik Moataz, Travis Mayberry, Erik-Oliver Blass, Constant Communication ORAM with Small Blocksize computer and communications security. pp. 862- 873 ,(2015) , 10.1145/2810103.2813701
Arvind Arasu, Spyros Blanas, Ken Eguro, Manas Joglekar, Raghav Kaushik, Donald Kossmann, Ravi Ramamurthy, Prasang Upadhyaya, Ramarathnam Venkatesan, Secure database-as-a-service with Cipherbase international conference on management of data. pp. 1033- 1036 ,(2013) , 10.1145/2463676.2467797
Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan, Efficient Private File Retrieval by Combining ORAM and PIR. network and distributed system security symposium. ,(2014) , 10.14722/NDSS.2014.23033
Arvind Arasu, Ken Eguro, Raghav Kaushik, Ravishankar Ramamurthy, Querying encrypted data international conference on management of data. pp. 1259- 1261 ,(2014) , 10.1145/2588555.2588893
David Cash, Paul Grubbs, Jason Perry, Thomas Ristenpart, Leakage-Abuse Attacks Against Searchable Encryption computer and communications security. pp. 668- 679 ,(2015) , 10.1145/2810103.2813700