Affiliation:
1. The Department of Computer Science and Engineering, University of South Florida, Tampa, Florida
2. Robert Bosch LLC, Research and Technology Center, Pittsburgh, PA
Abstract
Oblivious Random Access Machine (ORAM) allows a client to hide the access pattern when accessing sensitive data on a remote server. It is known that there exists a logarithmic communication lower bound on any passive ORAM construction, where the server only acts as the storage service. This overhead, however, was shown costly for some applications. Several active ORAM schemes with server computation have been proposed to overcome this limitation. However, they mostly rely on costly homomorphic encryptions, whose performance is worse than passive ORAM. In this article, we propose S
3
ORAM, a new multi-server ORAM framework, which features
O
(1) client bandwidth blowup and low client storage without relying on costly cryptographic primitives. Our key idea is to harness Shamir Secret Sharing and a multi-party multiplication protocol on applicable binary tree-ORAM paradigms. This strategy allows the client to instruct the server(s) to perform secure and efficient computation on his/her behalf with a low intervention thereby, achieving a constant client bandwidth blowup and low server computational overhead. Our framework can also work atop a general
k
-ary tree ORAM structure (
k
≥ 2). We fully implemented our framework, and strictly evaluated its performance on a commodity cloud platform (Amazon EC2). Our comprehensive experiments confirmed the efficiency of S
3
ORAM framework, where it is approximately 10× faster than the most efficient passive ORAM (i.e., Path-ORAM) for a moderate network bandwidth while being three orders of magnitude faster than active ORAM with
O
(1) bandwidth blowup (i.e., Onion-ORAM). We have open-sourced the implementation of our framework for public testing and adaptation.
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Reference44 articles.
1. Asymptotically Tight Bounds for Composing ORAM with PIR
2. Anastasov Anton. 2016. Implementing Onion ORAM: A Constant Bandwidth ORAM using AHE. Retrieved from https://github.com/aanastasov/onion-oram/blob/master/doc/report.pdf. Anastasov Anton. 2016. Implementing Onion ORAM: A Constant Bandwidth ORAM using AHE. Retrieved from https://github.com/aanastasov/onion-oram/blob/master/doc/report.pdf.
3. Verifiable Oblivious Storage
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Distributed Cyber-infrastructures and Artificial Intelligence in Hybrid Post-Quantum Era;2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA);2022-12
2. FedORAM: A Federated Oblivious RAM Scheme;IEEE Access;2020