Differentially Private Oblivious RAM
نویسندگان
چکیده
State-of-the-art mechanisms for oblivious RAM (ORAM) suffer from significant bandwidth overheads (greater than 100x) that impact the throughput and latency of memory accesses. This renders their deployment in high-performance and bandwidth-constrained applications difficult, motivating the design of lowoverhead approaches for memory access obfuscation. We introduce and formalize the notion of a differentially private ORAM that provides statistical privacy guarantees, and which to the extent of our knowledge, is the first of its kind. We present Root ORAM, a family of practical ORAMs that allow tunable trade-offs between system security and desired bandwidth overhead, and that provide the rigorous privacy guarantees of a differentially private ORAM. We demonstrate the practicality of Root ORAM using theoretical analysis, simulations, as well as real world experiments on Amazon EC2. Our theoretical analysis rigorously quantifies the privacy offered by Root ORAM and provably bounds the information leaked from observing memory access patterns. We also show that the simplest protocol in the Root ORAM family requires a bandwidth of a mere 10 blocks, at the cost of rigorously quantified security loss, and that this number is independent of the number of outsourced blocks N. This is an order of magnitude improvement over the state-of-theart ORAM schemes such as Path ORAM, which incurs a bandwidth overhead of 10 · logN blocks.
منابع مشابه
Accessing Data while Preserving Privacy
As organizations struggle with vast amounts of data, outsourcing sensitive data to third parties becomes a necessity. To protect the data, various cryptographic techniques are used in outsourced database systems to ensure data privacy, while allowing efficient querying. Recent attacks on such systems (e.g., [37, 30]) demonstrate that outsourced database systems must trade-off efficiency and pri...
متن کاملComparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation
Oblivious RAM (ORAM) schemes, the concept introduced by Goldreich and Ostrovsky, are very useful technique for protecting users’ privacy when storing data in remote untrusted servers and running software on untrusted systems. However they are usually considered impractical due to their huge overhead. In order to reduce overhead, many improvements have been presented. Thanks to these improvement...
متن کاملShroud: ensuring private access to large-scale data in the data center
Recent events have shown online service providers the perils of possessing private information about users. Encrypting data mitigates but does not eliminate this threat: the pattern of data accesses still reveals information. Thus, we present Shroud, a general storage system that hides data access patterns from the servers running it, protecting user privacy. Shroud functions as a virtual disk ...
متن کاملToward Practical Private Access to Data Centers via Parallel ORAM
Recent events have shown online service providers the perils of possessing private information about users. Encrypting data mitigates but does not eliminate this threat: the pattern of data accesses still reveals information. Thus, we present Shroud, a general storage system that hides data access patterns from the servers running it, protecting user privacy. Shroud functions as a virtual disk ...
متن کاملFoundations of Differentially Oblivious Algorithms
It is well-known that a program’s memory access pattern can leak information about its input. To thwart such leakage, most existing works adopt the technique of oblivious RAM (ORAM) simulation. Such an obliviousness notion has stimulated much debate. Although ORAM techniques have significantly improved over the past few years, the concrete overheads are arguably still undesirable for real-world...
متن کامل