skip to main content
10.1145/2810103.2813649acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward

Published: 12 October 2015 Publication History

Abstract

To understand the gap between theory and practice for oblivious cloud storage, we experimentally evaluate four representative Oblivious RAM (ORAM) designs on Amazon S3. We replay realistic application traces to these ORAMs in order to understand whether they can meet the demands of various real applications using cloud storage as a backend. We find that metrics traditionally used in the ORAM literature, e.g., bandwidth overhead, fail to capture the practical needs of those applications. With a new understanding of the desirable properties, relevant metrics, and observations about the cloud services and their applications, we propose CURIOUS, a new modular partition-based ORAM framework, and show experimentally that it is thus far the most promising approach.

References

[1]
D. Boneh, D. Mazieres, and R. A. Popa. Remote Oblivious Storage: Making Oblivious RAM Practical. 2011.
[2]
K. Chung, Z. Liu, and R. Pass. Statistically-Secure ORAM with Ø(log2 n) Overhead. ASIACRYPT, 2014.
[3]
J. Dautrich, E. Stefanov, and E. Shi. Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns. In USENIX Security, volume 14, 2014.
[4]
S. Devadas, M. van Dijk, C. W. Fletcher, and L. Ren. Onion ORAM: A Constant Bandwidth and Constant Client Storage ORAM (without FHE or SWHE). IACR ePrint, 2015.
[5]
O. Goldreich and R. Ostrovsky. Software Protection and Simulation on Oblivious RAMs. Journal of the ACM, 1996.
[6]
M. T. Goodrich. Randomized Shellsort: A Simple Oblivious Sorting Algorithm. In SODA, 2010.
[7]
M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia. Oblivious RAM Simulation with Efficient Worst-Case Access Overhead. In CCSW, 2011.
[8]
M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia. Practical Oblivious Storage. In CODASPY, 2012.
[9]
E. Kushilevitz, S. Lu, and R. Ostrovsky. On the (In)security of Hash-Based Oblivious RAM and a new Balancing Scheme. In SODA, 2012.
[10]
M. Maas, E. Love, E. Stefanov, M. Tiwari, E. Shi, K. Asanovic, J. Kubiatowicz, and D. Song. PHANTOM: Practical Oblivious Computation in a Secure Processor. In CCS, 2013.
[11]
T. Mayberry, E.-O. Blass, and A. H. Chan. Efficient Private File Retrieval by Combining ORAM and PIR. In NDSS, 2014.
[12]
R. McDougall. Filebench Tutorial. 2004.
[13]
T. Moataz, T. Mayberry, and E. Blass. Resizable Tree-Based Oblivious RAM. IACR ePrint, 2014.
[14]
T. Moataz, T. Mayberry, and E.-O. Blass. Constant Communication ORAM with Small Blocksize. In CCS, 2015.
[15]
O. Ohrimenko, M. T. Goodrich, R. Tamassia, and E. Upfal. The Melbourne Shuffle: Improving Oblivious Storage in the Cloud. In ALP. 2014.
[16]
B. Pinkas and T. Reinman. Oblivious RAM Revisited. In CRYPTO, 2010.
[17]
L. Ren, C. W. Fletcher, A. Kwon, E. Stefanov, E. Shi, M. van Dijk, and S. Devadas. Constants Count: Practical Improvements to Oblivious RAM. In USENIX Security, 2015.
[18]
S. Shepler, E. Kustarz, and A. Wilson. Filebench. http://sourceforge.net/projects/filebench/, 2015.
[19]
E. Shi, T.-H. H. Chan, E. Stefanov, and M. Li. Oblivious RAM with o((log n)3) Worst-Case Cost. In ASIACRYPT, 2011.
[20]
E. Stefanov and E. Shi. ObliviStore: High Performance Oblivious Cloud Storage. In S&P, 2013.
[21]
E. Stefanov, E. Shi, and D. X. Song. Towards Practical Oblivious RAM. In NDSS, 2012.
[22]
E. Stefanov, M. Van Dijk, E. Shi, C. Fletcher, L. Ren, X. Yu, and S. Devadas. Path ORAM: An Extremely Simple Oblivious RAM Protocol. In CCS, 2013.
[23]
X. S. Wang, T.-H. H. Chan, and E. Shi. Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound. IACR ePrint, 2014.
[24]
P. Williams and R. Sion. Single Round Access Privacy on Outsourced Storage. In CCS, 2012.
[25]
P. Williams, R. Sion, and A. Tomescu. PrivateFS: A Parallel Oblivious File System. In CCS, 2012.

Cited By

View all
  • (2024)Opca: Enabling Optimistic Concurrent Access for Multiple Users in Oblivious Data StorageIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2024.344162335:11(1891-1903)Online publication date: Nov-2024
  • (2024)Towards Practical Oblivious Join ProcessingIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.331003836:4(1829-1842)Online publication date: Apr-2024
  • (2024)PEO-Store: Delegation-Proof based Oblivious Storage with Secure Redundancy EliminationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.3361450(1-12)Online publication date: 2024
  • Show More Cited By

Index Terms

  1. Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
      October 2015
      1750 pages
      ISBN:9781450338325
      DOI:10.1145/2810103
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 12 October 2015

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. ORAM
      2. access pattern
      3. oblivious cloud storage
      4. oblivious ram

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      CCS'15
      Sponsor:

      Acceptance Rates

      CCS '15 Paper Acceptance Rate 128 of 660 submissions, 19%;
      Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)39
      • Downloads (Last 6 weeks)12
      Reflects downloads up to 05 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Opca: Enabling Optimistic Concurrent Access for Multiple Users in Oblivious Data StorageIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2024.344162335:11(1891-1903)Online publication date: Nov-2024
      • (2024)Towards Practical Oblivious Join ProcessingIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.331003836:4(1829-1842)Online publication date: Apr-2024
      • (2024)PEO-Store: Delegation-Proof based Oblivious Storage with Secure Redundancy EliminationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.3361450(1-12)Online publication date: 2024
      • (2024)Bulkor: Enabling Bulk Loading for Path ORAM2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00103(4258-4276)Online publication date: 19-May-2024
      • (2024)SQL queries over encrypted databases: a surveyConnection Science10.1080/09540091.2024.232305936:1Online publication date: 5-Mar-2024
      • (2023)Waffle: An Online Oblivious Datastore for Protecting Data Access PatternsProceedings of the ACM on Management of Data10.1145/36267601:4(1-25)Online publication date: 12-Dec-2023
      • (2023)Tianji: Securing a Practical Asynchronous Multi-User ORAMIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.324118420:6(5143-5155)Online publication date: Nov-2023
      • (2023)DevIOus: Device-Driven Side-Channel Attacks on the IOMMU2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179283(2288-2305)Online publication date: May-2023
      • (2023)Oblivious RAM with Worst-Case Logarithmic OverheadJournal of Cryptology10.1007/s00145-023-09447-536:2Online publication date: 24-Feb-2023
      • (2023)Memory Checking for Parallel RAMsTheory of Cryptography10.1007/978-3-031-48618-0_15(436-464)Online publication date: 29-Nov-2023
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media