An Accountability Scheme for Oblivious RAMs
نویسندگان
چکیده
In outsourced data services, revealing users’ data access pattern may lead to the exposure of a wide range of sensitive information even if data is encrypted. Oblivious RAM has been a well-studied provable solution to access pattern preservation. However, it is not resilient to attacks towards data integrity from the users or the server. In this paper, we study the problem of protecting access pattern privacy and data integrity together in outsourced data services, and propose a scheme that introduces accountability support into a hash-based ORAM design. The proposed scheme can detect misconduct committed by malicious users or server, and identify the attacker, while not interfering with the access pattern preservation mechanisms inherent from the underlying ORAM. This is accomplished at the cost of slightly increased computational, storage, and communication overheads compared with the original ORAM.
منابع مشابه
Towards Practical Oblivious RAM
We take an important step forward in making Oblivious RAM (O-RAM) practical. We pro-pose an O-RAM construction achieving an amortized overhead of 20 ∼ 35X (for an O-RAMroughly 1 terabyte in size), about 63 times faster than the best existing scheme. On the theoreticfront, we propose a fundamentally novel technique for constructing Oblivious RAMs: specifi-cally, we partition a bi...
متن کاملMaking RAMs Oblivious Requires Superlogarithmic Overhead
We prove a time-space tradeoff lower bound of T = Ω ( n log( n S ) log log( n S ) ) for randomized oblivious branching programs to compute 1GAP , also known as the pointer jumping problem, a problem for which there is a simple deterministic time n and space O(log n) RAM (random access machine) algorithm. Ajtai [3, 4] and Damgård, Meldgaard, and Nielsen [11] recently derived simulations of gener...
متن کاملAn Assessment Scheme for ELT Performance: An Iranian Case of Farhangian University
Accountability concerns in language education call for the development of more valid and authentic measures of assessment. In light of these concerns, performance assessment has received increasing interest in the context of teacher education programs and teacher licensing over the last decade. In Iran, a recent policy adopted by Farhangian University aims at assessing the professional competen...
متن کاملPrivate Information Storage with Logarithm-Space Secure Hardware
In Private Information Retrieval (PIR), a user obtains one of N records from a server, without the server learning what record was requested. Recent research in “practical PIR” has limited the players to the user and server and limited the user’s work to negotiating a session key (eg. as in SSL)— but then added a secure coprocessor to the server and required the secure coprocessor to encrypt/pe...
متن کاملPrivate Information Storage with Logarithmic-space Secure Hardware
In Private Information Retrieval (PIR), a user obtains one of N records from a server, without the server learning what record was requested. Recent research in “practical PIR” has limited the players to the user and server and limited the user’s work to negotiating a session key (eg. as in SSL)— but then added a secure coprocessor to the server and required the secure coprocessor to encrypt/pe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014