An Accountability Scheme for Oblivious RAMs

نویسندگان

  • Ka Yang
  • Daji Qiao
  • Jinsheng Zhang
  • Wensheng Zhang
چکیده

In outsourced data services, revealing users’ data access pattern may lead to the exposure of a wide range of sensitive information even if data is encrypted. Oblivious RAM has been a well-studied provable solution to access pattern preservation. However, it is not resilient to attacks towards data integrity from the users or the server. In this paper, we study the problem of protecting access pattern privacy and data integrity together in outsourced data services, and propose a scheme that introduces accountability support into a hash-based ORAM design. The proposed scheme can detect misconduct committed by malicious users or server, and identify the attacker, while not interfering with the access pattern preservation mechanisms inherent from the underlying ORAM. This is accomplished at the cost of slightly increased computational, storage, and communication overheads compared with the original ORAM.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards Practical Oblivious RAM

We take an important step forward in making Oblivious RAM (O-RAM) practical. We pro-pose an O-RAM construction achieving an amortized overhead of 20 ∼ 35X (for an O-RAMroughly 1 terabyte in size), about 63 times faster than the best existing scheme. On the theoreticfront, we propose a fundamentally novel technique for constructing Oblivious RAMs: specifi-cally, we partition a bi...

متن کامل

Making RAMs Oblivious Requires Superlogarithmic Overhead

We prove a time-space tradeoff lower bound of T = Ω ( n log( n S ) log log( n S ) ) for randomized oblivious branching programs to compute 1GAP , also known as the pointer jumping problem, a problem for which there is a simple deterministic time n and space O(log n) RAM (random access machine) algorithm. Ajtai [3, 4] and Damgård, Meldgaard, and Nielsen [11] recently derived simulations of gener...

متن کامل

An Assessment Scheme for ELT Performance: An Iranian Case of Farhangian University

Accountability concerns in language education call for the development of more valid and authentic measures of assessment. In light of these concerns, performance assessment has received increasing interest in the context of teacher education programs and teacher licensing over the last decade. In Iran, a recent policy adopted by Farhangian University aims at assessing the professional competen...

متن کامل

Private Information Storage with Logarithm-Space Secure Hardware

In Private Information Retrieval (PIR), a user obtains one of N records from a server, without the server learning what record was requested. Recent research in “practical PIR” has limited the players to the user and server and limited the user’s work to negotiating a session key (eg. as in SSL)— but then added a secure coprocessor to the server and required the secure coprocessor to encrypt/pe...

متن کامل

Private Information Storage with Logarithmic-space Secure Hardware

In Private Information Retrieval (PIR), a user obtains one of N records from a server, without the server learning what record was requested. Recent research in “practical PIR” has limited the players to the user and server and limited the user’s work to negotiating a session key (eg. as in SSL)— but then added a secure coprocessor to the server and required the secure coprocessor to encrypt/pe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014