Deterministic, Stash-Free Write-Only ORAM

作者: Daniel S. Roche , Adam Aviv , Seung Geol Choi , Travis Mayberry

DOI: 10.1145/3133956.3134051

关键词:

摘要: Write-Only Oblivious RAM (WoORAM) protocols provide privacy by encrypting the contents of data and also hiding pattern write operations over that data. WoORAMs better than plain encryption performance more general ORAM schemes (which hide both writing reading access patterns), write-oblivious setting has been applied to important applications cloud storage synchronization encrypted hidden volumes. In this paper, we introduce an entirely new technique for ORAM, called DetWoORAM. Unlike previous solutions, DetWoORAM uses a deterministic, sequential without need any "stashing" blocks in local state when writes fail. Our protocol, while conceptually simple, provides substantial improvement prior asymptotically experimentally. particular, under typical settings only 2 (sequentially) backend memory each block written device, which is optimal. We have implemented our solution using BUSE (block device user-space) module tested against baseline dm-crypt prior, randomized WoORAM measuring 3x-14x slowdown compared encryption-only around 6x-19x speedup work.

参考文章(30)
Chang Liu, Xiao Shaun Wang, Kartik Nayak, Yan Huang, Elaine Shi, None, ObliVM: A Programming Framework for Secure Computation 2015 IEEE Symposium on Security and Privacy. pp. 359- 376 ,(2015) , 10.1109/SP.2015.29
Ross Anderson, Roger Needham, Adi Shamir, The steganographic file system information hiding. pp. 73- 82 ,(1998) , 10.1007/3-540-49380-8_6
Andrew D. McDonald, Markus G. Kuhn, StegFS: A Steganographic File System for Linux Information Hiding. pp. 463- 477 ,(2000) , 10.1007/10719724_32
Oded Goldreich, Rafail Ostrovsky, Software protection and simulation on oblivious RAMs Journal of the ACM. ,vol. 43, pp. 431- 473 ,(1996) , 10.1145/233551.233553
Tarik Moataz, Travis Mayberry, Erik-Oliver Blass, Constant Communication ORAM with Small Blocksize computer and communications security. pp. 862- 873 ,(2015) , 10.1145/2810103.2813701
Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan, Efficient Private File Retrieval by Combining ORAM and PIR. network and distributed system security symposium. ,(2014) , 10.14722/NDSS.2014.23033
E. Stefanov, E. Shi, ObliviStore: High Performance Oblivious Cloud Storage ieee symposium on security and privacy. pp. 253- 267 ,(2013) , 10.1109/SP.2013.25
Marina Blanton, Aaron Steele, Mehrdad Alisagari, Data-oblivious graph algorithms for secure computation and outsourcing computer and communications security. pp. 207- 218 ,(2013) , 10.1145/2484313.2484341
Chang Liu, Yan Huang, Elaine Shi, Jonathan Katz, Michael Hicks, Automating Efficient RAM-Model Secure Computation ieee symposium on security and privacy. pp. 623- 638 ,(2014) , 10.1109/SP.2014.46
Xiao Wang, Hubert Chan, Elaine Shi, Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound computer and communications security. pp. 850- 861 ,(2015) , 10.1145/2810103.2813634