Revisiting Definitional Foundations of Oblivious RAM for Secure Processor Implementations
نویسندگان
چکیده
Oblivious RAM (ORAM) is a renowned technique to hide the access paerns of an application to an untrusted memory. According to the standard ORAM denition presented by Goldreich and Ostrovsky, in order for two ORAM access sequences to be computationally indistinguishable, the lengths of these sequences must be identically distributed. An artifact of this denition is that it does not apply to modern ORAM implementations adapted in current secure processors technology because of their arbitrary lengths of memory access sequences depending on programs’ behaviors. As a result, the ORAM timing and termination channels are not catered for in the theoretical foundations of ORAM. is paper conducts a rst rigorous study of the standard ORAM denition in view of modern practical ORAMs (e.g., Path ORAM) and demonstrates the gap between theoretical foundations and real implementations. A formal ORAM denition which allows arbitrary lengths of ORAM sequences, hence incorporating timing/termination channel leakage, has been proposed. It has been shown how this denition is much broader than the standard ORAM denition and beer ts the modern practical ORAM implementations. e proposed denition relaxes the constraints around the stash size and overow probability for Path ORAM, and essentially transforms its security argument into a performance consideration problem. Finally, to mitigate internal side channel leakages, a generic framework for dynamic resource partitioning has been proposed to achieve a balance between performance and leakage via contention on shared resources.
منابع مشابه
Oblivious Network RAM
Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely access untrusted memory, such that the access patterns reveal nothing about sensitive data. ORAM is known to have broad applications in secure processor design and secure multi-party computation for big data. Unfortunately, due to a well-known logarithmic lower bound by Goldreich and Ostrovsky (Journal of th...
متن کاملDesign space exploration and optimization of path oblivious RAM in secure processors Citation
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One paradigm to achieve data privacy is to use tamper-resistant processors, inside which users’ private data is decrypted and computed upon. These processors need to interact with untrusted external memory. Even if we encrypt all data that leaves the trusted processor, however, the address sequence ...
متن کاملCircuit OPRAM: A Unifying Framework for Statistically and Computationally Secure ORAMs and OPRAMs
An Oblivious Parallel RAM (OPRAM) provides a general method to simulate any Parallel RAM (PRAM) program, such that the resulting memory access patterns leak nothing about secret inputs. OPRAM was originally proposed by Boyle et al. as the natural parallel counterpart of Oblivious RAM (ORAM), which was shown to have broad applications, e.g., in cloud outsourcing, secure processor design, and sec...
متن کاملCircuit OPRAM: Unifying Statistically and Computationally Secure ORAMs and OPRAMs
An Oblivious Parallel RAM (OPRAM) provides a general method to simulate any Parallel RAM (PRAM) program, such that the resulting memory access patterns leak nothing about secret inputs. OPRAM was originally proposed by Boyle et al. as the natural parallel counterpart of Oblivious RAM (ORAM), which was shown to have broad applications, e.g., in cloud outsourcing, secure processor design, and sec...
متن کاملPerfectly Secure Oblivious RAM without Random Oracles
We present an algorithm for implementing a secure oblivious RAM where the access pattern is perfectly hidden in the information theoretic sense, without assuming that the CPU has access to a random oracle. In addition we prove a lover bound on the amount of randomness needed for information theoretically secure oblivious RAM.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1706.03852 شماره
صفحات -
تاریخ انتشار 2017