skip to main content
10.1145/2699026.2699097acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
research-article

Tunably-Oblivious Memory: Generalizing ORAM to Enable Privacy-Efficiency Tradeoffs

Published:02 March 2015Publication History

ABSTRACT

We consider the challenge of providing privacy-preserving access to data outsourced to an untrusted cloud provider. Even if data blocks are encrypted, access patterns may leak valuable information. Oblivious RAM (ORAM) protocols guarantee full access pattern privacy, but even the most efficient ORAMs to date require roughly L log2 N block transfers to satisfy an L-block query, for block store capacity N.

We propose a generalized form of ORAM called Tunably-Oblivious Memory (lambda-TOM) that allows a query's public access pattern to assume any of lambda possible lengths. Increasing lambda yields improved efficiency at the cost of weaker privacy guarantees. 1-TOM protocols are as secure as ORAM.

We also propose a novel, special-purpose TOM protocol called Staggered-Bin TOM (SBT), which efficiently handles large queries that are not cache-friendly. We also propose a read-only SBT variant called Multi-SBT that can satisfy such queries with only O(L + log N) block transfers in the best case, and only O(L log N) transfers in the worst case, while leaking only O(log log log N) bits of information per query. Our experiments show that for N = 2^24 blocks, Multi-SBT achieves practical bandwidth costs as low as 6X those of an unprotected protocol for large queries, while leaking at most 3 bits of information per query.

References

  1. D. Boneh, D. Mazieres, and R. A. Popa. Remote oblivious storage: Making oblivious RAM practical. Manuscript, http://dspace.mit.edu/bitstream/ handle/1721.1/62006/MIT-CSAIL-TR-2011-018.pdf, 2011.Google ScholarGoogle Scholar
  2. J. A. Cain, P. Sanders, and N. Wormald. The random graph threshold for k-orientiability and a fast algorithm for optimal multiple-choice allocation. In Proc. SODA, pages 469--476. Society for Industrial and Applied Mathematics, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J. Dautrich. Achieving Practical Access Pattern Privacy in Data Outsourcing. PhD thesis, University of California, Riverside, 2014.Google ScholarGoogle Scholar
  4. J. Dautrich and C. Ravishankar. Compromising privacy in precise query protocols. In Proc. EDBT, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Dautrich and C. Ravishankar. Combining oram with pir to minimize bandwidth costs. In CODASPY, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Dautrich, E. Stefanov, and E. Shi. Burst ORAM: Minimizing ORAM response times for bursty access patterns. In USENIX Security, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati. Efficient and private access to outsourced data. In Proc. ICDCS, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. C. Gentry, K. Goldman, S. Halevi, C. Julta, M. Raykova, and D. Wichs. Optimizing ORAM and using it efficiently for secure computation. In PETS, 2013.Google ScholarGoogle Scholar
  9. O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious RAMs. Journal of the ACM (JACM), 43(3):431--473, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia. Privacy-preserving group data access via stateless oblivious RAM simulation. In Proc. SODA, pages 157--167. SIAM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Islam, M. Kuzu, and M. Kantarcioglu. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In NDSS, 2012.Google ScholarGoogle Scholar
  12. N. L. Johnson and S. Kotz. Urn models and their application: an approach to modern discrete probability theory. Wiley New York, 1977.Google ScholarGoogle Scholar
  13. E. Kushilevitz, S. Lu, and R. Ostrovsky. On the (in)security of hash-based oblivious RAM and a new balancing scheme. In Proc. SODA, pages 143--156. SIAM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J. R. Lorch, B. Parno, J. W. Mickens, M. Raykova, and J. Schiffman. Shroud: Ensuring private access to large-scale data in the data center. FAST, pages199--213, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Maas, E. Love, E. Stefanov, M. Tiwari, E. Shi, K. Asanovic, J. Kubiatowicz, and D. Song. PHANTOM: Practical oblivious computation in a secure processor. In ACM CCS, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. T. Mayberry, E.-O. Blass, and A. H. Chan. Efficient private file retrieval by combining ORAM and PIR. In NDSS, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  17. M. Mitzenmacher. Some open questions related to cuckoo hashing. In Algorithms-ESA 2009, pages 1--10. Springer, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  18. Y. Nakano, C. Cid, S. Kiyomoto, and Y. Miyake. Memory access pattern protection for resource-constrained devices. In Smart Card Research and Advanced Applications, pages 188--202. Springer, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Raab and A. Steger. Balls into bins -- a simple and tight analysis. In Randomization and Approximation Techniques in Computer Science, pages 159--170. Springer, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. R. Sion. On the computational practicality of private information retrieval. In Proc. NDSS, 2007.Google ScholarGoogle Scholar
  21. E. Stefanov and E. Shi. Multi-Cloud Oblivious Storage. In CCS, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. E. Stefanov and E. Shi. ObliviStore: High performance oblivious cloud storage. In IEEE Symposium on Security and Privacy, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. E. Stefanov, E. Shi, and D. Song. Towards practical oblivious RAM. NDSS, 2012.Google ScholarGoogle Scholar
  24. E. Stefanov, M. van Dijk, E. Shi, C. Fletcher, L. Ren, X. Yu, and S. Devadas. Path ORAM: An extremely simple oblivious RAM protocol. In ACM CCS, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. P. Williams, R. Sion, and A. Tomescu. PrivateFS: A parallel oblivious file system. In CCS, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. X. Yu, C. W. Fletcher, L. Ren, M. v. Dijk, and S. Devadas. Generalized external interaction with tamper-resistant hardware with bounded information leakage. In Proc. ACM CCSW, pages 23--34. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Tunably-Oblivious Memory: Generalizing ORAM to Enable Privacy-Efficiency Tradeoffs

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CODASPY '15: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy
        March 2015
        362 pages
        ISBN:9781450331913
        DOI:10.1145/2699026

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 2 March 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CODASPY '15 Paper Acceptance Rate19of91submissions,21%Overall Acceptance Rate149of789submissions,19%

        Upcoming Conference

        CODASPY '24

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader