MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services
نویسندگان
چکیده
Outsourcing data to remote storage servers has become more andmore popular, but the related security and privacy concerns havealso been raised. To protect the pattern in which a user accessesthe outsourced data, various oblivious RAM (ORAM) construc-tions have been designed. However, when existing ORAM designsare extended to support multi-user scenarios, they become vulner-able to stealthy privacy attacks targeted at revealing the data accesspatterns of innocent users, even if only one curious or compro-mised user colludes with the storage server. To study the feasibilityand costs of overcoming the above limitation, this paper proposes anew ORAM construction called Multi-User ORAM (MU-ORAM),which is resilient to stealthy privacy attacks. The key ideas in thedesign are (i) introduce a chain of proxies to act as a common inter-face between users and the storage server, (ii) distribute the sharesof the system secrets delicately to the proxies and users, and (iii)enable a user and/or the proxies to collaboratively query and shuffledata. Through extensive security analysis, we quantify the strengthof MU-ORAM in protecting the data access patterns of innocentusers from attacks, under the assumption that the server, users, andsome but not all proxies can be curious but honest, compromisedand colluding. Cost analysis has been conducted to quantify theextra overhead incurred by the MU-ORAM design.
منابع مشابه
ObliviStore: High Performance Oblivious Distributed Cloud Data Store
It is well established that access patterns to encrypted data can leak a considerable amount of sensitive information [13]. Oblivious RAM (or ORAM for short) [5–11, 14, 18–20, 26, 28], originally proposed by Goldreich and Ostrovsky [8], is a cryptographic construction that allows a client to access encrypted data residing on an untrusted storage server, while completely hiding the access patter...
متن کاملA Multi-user Oblivious RAM for Outsourced Data
Outsourcing data to remote storage servers has become more and more popular, but the related security and privacy concerns have also been raised. To protect the pattern in which a user accesses the outsourced data, various oblivious RAM (ORAM) systems have been proposed. However, existing ORAM designs assume a single user or a group of mutuallytrusted users to access a remote storage, which mak...
متن کاملAn Accountability Scheme for Oblivious RAMs
In outsourced data services, revealing users’ data access pattern may lead to the exposure of a wide range of sensitive information even if data is encrypted. Oblivious RAM has been a well-studied provable solution to access pattern preservation. However, it is not resilient to attacks towards data integrity from the users or the server. In this paper, we study the problem of protecting access ...
متن کاملDesign space exploration and optimization of path oblivious RAM in secure processors Citation
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One paradigm to achieve data privacy is to use tamper-resistant processors, inside which users’ private data is decrypted and computed upon. These processors need to interact with untrusted external memory. Even if we encrypt all data that leaves the trusted processor, however, the address sequence ...
متن کاملSESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2016 شماره
صفحات -
تاریخ انتشار 2016