Fast Oblivious Storage
نویسندگان
چکیده
We introduce three practicality-critical components for Oblivious RAM (ORAM): (i) parallelism, (ii) deamortization, and (iii) fork-consistency defense against malicious adversaries. In (i), instead of waiting for the completion of ongoing client-server transactions, client threads can now engage a server in parallel without loss of privacy. This critical piece is missing from existing ORAMs, which can not allow multiple clients threads to operate simultaneously without revealing intraand inter-query correlations and thus incurring privacy leaks. And since ORAMs often require many communication rounds, this significantly and unnecessarily constrains throughput. The mechanisms introduced here eliminate this constraint, allowing overall throughput to be bound by server bandwidth only, and thus to increase by an order of magnitude. Further, in (ii) new de-amortization techniques bring the extremely impractical worst case ORAM query cost (e.g., having to periodically wait for tens or hundreds of hours for ORAM reshuffles to complete before being able to execute the next query) in line with the average cost. Both (i) and (ii) are shown to be fundamental to any practical ORAM. Finally, (iii) extensions providing fork consistency against an actively malicious adversary are then presented. A high performance, fully functional implementation (PD-ORAM) was designed, built and analyzed. It performs multiple queries per second on a 1TB+ database across 50ms latency links, with unamortized, bound query latencies. Based on PD-ORAM, PrivateFS an oblivious file system that enables access to remote storage, while keeping both the file contents and client access patterns secret was built and deployed on Linux as a userspace file system. For a single-CPU server throughput can exceed 300Kbps with almost optimal bandwidth utilization.
منابع مشابه
Blizzard: Fast, Cloud-scale Block Storage for Cloud-oblivious Applications
Blizzard is a high-performance block store that exposes cloud storage to cloud-oblivious POSIX and Win32 applications. Blizzard connects clients and servers using a network with full-bisection bandwidth, allowing clients to access any remote disk as fast as if it were local. Using a novel striping scheme, Blizzard exposes high disk parallelism to both sequential and random workloads; also, by d...
متن کاملShroud: ensuring private access to large-scale data in the data center
Recent events have shown online service providers the perils of possessing private information about users. Encrypting data mitigates but does not eliminate this threat: the pattern of data accesses still reveals information. Thus, we present Shroud, a general storage system that hides data access patterns from the servers running it, protecting user privacy. Shroud functions as a virtual disk ...
متن کاملThe Melbourne Shuffle: Improving Oblivious Storage in the Cloud
We present a simple, efficient, and secure data-oblivious randomized shuffle algorithm. This is the first secure data-oblivious shuffle that is not based on sorting. Our method can be used to improve previous oblivious storage solutions for network-based outsourcing of data.
متن کاملSimple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model
We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. König, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from König et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious trans...
متن کاملCommitment and Oblivious Transfer in the Bounded Storage Model with Errors
The bounded storage model restricts the memory of an adversary in a cryptographic protocol, rather than restricting its computational power, making information theoretically secure protocols feasible. We present the first protocols for commitment and oblivious transfer in the bounded storage model with errors, i.e., the model where the public random sources available to the two parties are not ...
متن کاملGecko: A Contention-Oblivious Design for Cloud Storage
Disk contention is a fact of life in modern data centers, with multiple applications sharing the storage resources of a single physical machine. Log-structured storage designs are ideally suited for such high-contention settings, but historically have suffered from performance problems due to cleaning overheads. In this paper, we introduce Gecko, a novel design for storage arrays where a single...
متن کامل