MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services

نویسندگان

  • Jinsheng Zhang
  • Wensheng Zhang
  • Daji Qiao
چکیده

Outsourcing data to remote storage servers has become more andmore popular, but the related security and privacy concerns havealso been raised. To protect the pattern in which a user accessesthe outsourced data, various oblivious RAM (ORAM) construc-tions have been designed. However, when existing ORAM designsare extended to support multi-user scenarios, they become vulner-able to stealthy privacy attacks targeted at revealing the data accesspatterns of innocent users, even if only one curious or compro-mised user colludes with the storage server. To study the feasibilityand costs of overcoming the above limitation, this paper proposes anew ORAM construction called Multi-User ORAM (MU-ORAM),which is resilient to stealthy privacy attacks. The key ideas in thedesign are (i) introduce a chain of proxies to act as a common inter-face between users and the storage server, (ii) distribute the sharesof the system secrets delicately to the proxies and users, and (iii)enable a user and/or the proxies to collaboratively query and shuffledata. Through extensive security analysis, we quantify the strengthof MU-ORAM in protecting the data access patterns of innocentusers from attacks, under the assumption that the server, users, andsome but not all proxies can be curious but honest, compromisedand colluding. Cost analysis has been conducted to quantify theextra overhead incurred by the MU-ORAM design.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ObliviStore: High Performance Oblivious Distributed Cloud Data Store

It is well established that access patterns to encrypted data can leak a considerable amount of sensitive information [13]. Oblivious RAM (or ORAM for short) [5–11, 14, 18–20, 26, 28], originally proposed by Goldreich and Ostrovsky [8], is a cryptographic construction that allows a client to access encrypted data residing on an untrusted storage server, while completely hiding the access patter...

متن کامل

A Multi-user Oblivious RAM for Outsourced Data

Outsourcing data to remote storage servers has become more and more popular, but the related security and privacy concerns have also been raised. To protect the pattern in which a user accesses the outsourced data, various oblivious RAM (ORAM) systems have been proposed. However, existing ORAM designs assume a single user or a group of mutuallytrusted users to access a remote storage, which mak...

متن کامل

An Accountability Scheme for Oblivious RAMs

In outsourced data services, revealing users’ data access pattern may lead to the exposure of a wide range of sensitive information even if data is encrypted. Oblivious RAM has been a well-studied provable solution to access pattern preservation. However, it is not resilient to attacks towards data integrity from the users or the server. In this paper, we study the problem of protecting access ...

متن کامل

Design space exploration and optimization of path oblivious RAM in secure processors Citation

Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One paradigm to achieve data privacy is to use tamper-resistant processors, inside which users’ private data is decrypted and computed upon. These processors need to interact with untrusted external memory. Even if we encrypt all data that leaves the trusted processor, however, the address sequence ...

متن کامل

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2016  شماره 

صفحات  -

تاریخ انتشار 2016