Affiliation:
1. Stony Brook University, Stony Brook, NY
Abstract
We introduce a new practical mechanism for remote data storage with
access pattern privacy
and
correctness
. A storage client can deploy this mechanism to issue encrypted reads, writes, and inserts to a potentially curious and malicious storage service provider, without revealing information or access patterns. The provider is unable to establish any correlation between successive accesses, or even to distinguish between a read and a write. Moreover, the client is provided with strong correctness assurances for its operations—illicit provider behavior does not go undetected. We describe a practical system that can execute an unprecedented several queries per second on terabyte-plus databases while maintaining full computational privacy and correctness.
Funder
National Science Foundation
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Reference35 articles.
1. Amazon Web Services LIC. 2012. Amazon simple storage service faqs. http://aws.amazon.com/s3/faqs/. Amazon Web Services LIC. 2012. Amazon simple storage service faqs. http://aws.amazon.com/s3/faqs/.
2. Asonov D. 2004. Querying Databases Privately: A New Approach to Private Information Retrieval. Springer. Asonov D. 2004. Querying Databases Privately: A New Approach to Private Information Retrieval. Springer.
3. Bellovin S. M. and Cheswick W. R. 2004. Privacy-enhanced searches using encrypted bloom filters. Tech. rep. Columbia University. https://mice.cs.columbia.edu/getTechreport.php?techreportID=483. Bellovin S. M. and Cheswick W. R. 2004. Privacy-enhanced searches using encrypted bloom filters. Tech. rep. Columbia University. https://mice.cs.columbia.edu/getTechreport.php?techreportID=483.
4. Space/time trade-offs in hash coding with allowable errors
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献