Filters








29 Hits in 1.7 sec

ObliviStore: High Performance Oblivious Cloud Storage

E. Stefanov, E. Shi
2013 2013 IEEE Symposium on Security and Privacy  
We design and build ObliviStore, a high performance, distributed ORAM-based cloud data store secure in the malicious model.  ...  We propose various practical optimizations which are key to achieving high performance, as well as techniques for a data center to dynamically scale up a distributed ORAM.  ...  In ObliviStore, our oblivious load balancer stores about 4 bytes of metadata per data block.  ... 
doi:10.1109/sp.2013.25 dblp:conf/sp/StefanovS13 fatcat:eac4fgxvnzhhhgywanz5y42z2m

Practicing Oblivious Access on Cloud Storage

Vincent Bindschaedler, Muhammad Naveed, Xiaorui Pan, XiaoFeng Wang, Yan Huang
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
To understand the gap between theory and practice for oblivious cloud storage, we experimentally evaluate four representative Oblivious RAM (ORAM) designs on Amazon S3.  ...  We replay realistic application traces to these ORAMs in order to understand whether they can meet the demands of various real applications using cloud storage as a backend.  ...  ObliviStore [20] . Among all the schemes we tested, Oblivi-Store is the most complex one.  ... 
doi:10.1145/2810103.2813649 dblp:conf/ccs/Bindschaedler0P15 fatcat:6wpbcn7kh5cwjc4inf4jducxly

Understanding the security challenges of oblivious cloud storage with asynchronous accesses

Cetin Sahin, Aaron Magat, Victor Zakhary, Amr El Abbadi, Huijia Lin, Stefano Tessaro
2017 2017 IEEE 33rd International Conference on Data Engineering (ICDE)  
In particular, we explore oblivious storage systems which hide both the content of data and data access patterns from an untrusted cloud provider.  ...  This demonstration introduces the database community to state-of-the-art cryptographic methods that ensure efficient oblivious access to cloud data.  ...  as the resulting significant overheads that truly secure oblivious stores require.  ... 
doi:10.1109/icde.2017.185 dblp:conf/icde/SahinMZALT17 fatcat:ugip7wwp75hvxijzyogzx6lhcm

PRO-ORAM: Practical Read-Only Oblivious RAM

Shruti Tople, Yaoqi Jia, Prateek Saxena
2019 International Symposium on Recent Advances in Intrusion Detection  
Although a long line of research has improved the performance overhead of ORAM solutions [20, 32, 37, 40, 42, 43] , it is still considerably high for use in practice.  ...  Oblivious RAM is a well-known cryptographic primitive to hide data access patterns.  ...  After the initial data is uploaded, users mainly perform read requests to access the data from the cloud. Let a data owner upload N files each having a file identifier to the cloud.  ... 
dblp:conf/raid/TopleJS19 fatcat:rqhmm5v425f6piams623xh57ry

PRO-ORAM: Constant Latency Read-Only Oblivious RAM [article]

Shruti Tople, Yaoqi Jia, Prateek Saxena
2018 IACR Cryptology ePrint Archive  
Oblivious RAM is a well-known cryptographic primitive to hide data access patterns.  ...  PRO-ORAM theoretically and empirically guarantees this for read-only data access patterns, wherein data is written once followed by read requests.  ...  Similar to PRO-ORAM, ObliviStore parallelizes the access and shuffle operations using a trusted proxy for cloud-based data storage services.  ... 
dblp:journals/iacr/TopleJS18 fatcat:wta5x2mqrja5ribfaevoydptru

Privacy Preserving Data Access to Cloud

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Every cloud service provider ensures data is stored in an encrypted form in its servers.  ...  ORAM algorithm is used to enable access to user data stored on distributed file systems that comprises of multiple servers stored either at a single location or multiple locations across the globe in a  ...  HAIL (High Availability and Integrity Layer) is a system with distributed cryptography where a number of servers ensure a client that, the stored files are recoverable and not harmed [5] .  ... 
doi:10.35940/ijitee.i8663.078919 fatcat:llcd73ccv5er3lh3lyfsk4k57q

Combining ORAM with PIR to Minimize Bandwidth Costs

Jonathan Dautrich, Chinya Ravishankar
2015 Proceedings of the 5th ACM Conference on Data and Application Security and Privacy - CODASPY '15  
Even if the stored data are encrypted, access patterns may leak valuable information.  ...  Cloud computing allows customers to outsource the burden of data management and benefit from economy of scale, but privacy concerns limit its reach.  ...  Oblivious RAM (ORAM) Oblivious RAM (ORAM) was first proposed in [9] . Like PIR, ORAM may be used to retrieve encrypted data from a server without revealing which data were accessed.  ... 
doi:10.1145/2699026.2699117 dblp:conf/codaspy/DautrichR15 fatcat:s77xbzhflrfnfdw2wkwzzvk7xy

Oblivious RAM

Zhao Chang, Dong Xie, Feifei Li
2016 Proceedings of the VLDB Endowment  
Many companies choose the cloud as their data and IT infrastructure platform. The remote access of the data brings the issue of trust.  ...  We perform extensive experiments to provide insights into their performance characteristics with respect to efficiency, scalability, and communication cost.  ...  ObliviStore [31] is a high performance, distributed ORAM based cloud data store. It uses an ORAM construction that is similar to TP-ORAM [32] .  ... 
doi:10.14778/2994509.2994528 fatcat:m6szxgakmjh3jhprvqg2fel4dq

Multi-cloud oblivious storage

Emil Stefanov, Elaine Shi
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
We present a 2-cloud oblivious storage (ORAM) system that achieves 2.6X bandwidth cost between the client and the cloud.  ...  the clouds where bandwidth provisioning is abundant.  ...  In practice, each cloud can distribute the data across multiple servers.  ... 
doi:10.1145/2508859.2516673 dblp:conf/ccs/StefanovS13 fatcat:e4jbexipmndn7hr2y2h3admgcy

Snoopy: Surpassing the Scalability Bottleneck of Oblivious Storage [article]

Emma Dauterman, Vivian Fang, Ioannis Demertzis, Natacha Crooks, Raluca Ada Popa
2021 IACR Cryptology ePrint Archive  
Snoopy contributes techniques tailored to the high-throughput regime to securely distribute and efficiently parallelize every system component without prohibitive coordination costs.  ...  To overcome this scalability bottleneck, we present Snoopy, an object store that is both oblivious and scalable such that adding more machines increases system throughput.  ...  Real-world applications Snoopy is valuable for applications that need a high-throughput object store for confidential data, including outsourced file storage [3] , cloud electronic health records, and  ... 
dblp:journals/iacr/DautermanFDCP21 fatcat:pmg63ttr3jambd4qop3aowwk4e

Obladi: Oblivious Serializable Transactions in the Cloud [article]

Natacha Crooks and Matthew Burke and Ethan Cecchetti and Sitar Harel and Rachit Agarwal and Lorenzo Alvisi
2018 arXiv   pre-print
Obladi uses as its building block oblivious RAM, but turns the demands of supporting transactions into a performance opportunity.  ...  These performance gains, combined with new oblivious mechanisms for concurrency control and recovery, allow Obladi to execute OLTP workloads with reasonable throughput: it comes within 5x to 12x of a non-oblivious  ...  These performance gains are especially significant in the presence of long-running transactions or high storage access latency, as is often the case for cloud storage systems.  ... 
arXiv:1809.10559v1 fatcat:lso2e5bn3vbehpagardlsamrhy

QuORAM: A Quorum-Replicated Fault Tolerant ORAM Datastore [article]

Sujaya Maiyya, Seif Ibrahim, Caitlin Scarberry, Divyakant Agrawal, Amr El Abbadi, Huijia Lin, Stefano Tessaro, Victor Zakhary
2022 IACR Cryptology ePrint Archive  
Privacy and security challenges due to the outsourcing of data storage and processing to third-party cloud providers are well known.  ...  But most existing ORAM datastores are not fault tolerant in that if the external storage server (which stores encrypted data) or the trusted proxy (which stores the encryption key and other metadata) crashes  ...  Today, many products with high traffic, such as Twitter [5] , Spotify [4] , and Netflix [3] , rely on cloud storage for some or all of their data storage requirements.  ... 
dblp:journals/iacr/MaiyyaISAALTZ22 fatcat:gej3igsp4bbplhjvvj32tnvhea

Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists

Erik-Oliver Blass, Travis Mayberry, Guevara Noubir
2015 Proceedings on Privacy Enhancing Technologies  
At the heart of RASP, we develop a new update-oblivious bucket-based data structure. We allow for data to be added to buckets without leaking into which bucket it has been added.  ...  We revisit the problem of privacy-preserving range search and sort queries on encrypted data in the face of an untrusted data store. Our new protocol RASP has several advantages over existing work.  ...  In both application scenarios, the stored data is sensi-tive, and the underlying cloud store should not learn details about either stored data or queries performed.  ... 
doi:10.1515/popets-2015-0015 dblp:journals/popets/BlassMN15 fatcat:plhzhoqehzgktogelnkejjffo4

Query processing in multilevel secure distributed databases

Pooja Sapra, Suresh Kumar, Rk Rathy
2014 2014 IEEE International Advance Computing Conference (IACC)  
A number of recent works explore trusted hardware enclaves as a path toward secure, access-pattern oblivious outsourcing of data storage and analysis.  ...  Hardware enclaves such as Intel SGX are a promising technology for improving the security of databases outsourced to the cloud.  ...  INTRODUCTION Many organizations outsource their databases to the public cloud to take advantage of its cost efficiency, high availability, and convenience.  ... 
doi:10.1109/iadcc.2014.6779373 fatcat:w3hlim3rezgr7k4cfgqfibbmei

ObliDB: Oblivious Query Processing for Secure Databases [article]

Saba Eskandarian, Matei Zaharia
2019 arXiv   pre-print
A number of recent works explore trusted hardware enclaves as a path toward secure, access-pattern oblivious outsourcing of data storage and analysis.  ...  Hardware enclaves such as Intel SGX are a promising technology for improving the security of databases outsourced to the cloud.  ...  Introduction Many organizations outsource their databases to the public cloud to take advantage of its cost efficiency, high availability, and convenience.  ... 
arXiv:1710.00458v6 fatcat:da3l3u2safakzmx3oscjhiru5a
« Previous Showing results 1 — 15 out of 29 results