Comparison of access pattern protection schemes and proposals for efficient implementation

Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai

Research output: Contribution to journalArticle

Abstract

Oblivious RAM (ORAM) schemes, the concept introduced by Goldreich and Ostrovsky, are very useful technique for protecting users' privacy when storing data in remote untrusted servers and running software on untrusted systems. However they are usually considered impractical due to their huge overhead. In order to reduce overhead, many improvements have been presented. Thanks to these improvements, ORAM schemes can be considered practical on cloud environment where users can expect huge storage and high computational power. Especially for private information retrieval (PIR), some literatures demonstrated they are usable. Also dedicated PIRs have been proposed and shown that they are usable in practice. Yet, they are still impractical for protecting software running on untrusted systems. We first survey recent researches on ORAM and PIR. Then, we present a practical software-based memory protection scheme applicable to several environments. The main feature of our scheme is that it records the history of accesses and uses the history to hide the access pattern. We also address implementing issues of ORAM and propose practical solutions for these issues.

Original languageEnglish
Pages (from-to)2576-2585
Number of pages10
JournalIEICE Transactions on Information and Systems
VolumeE97D
Issue number10
DOIs
Publication statusPublished - Oct 1 2014

Fingerprint

Random access storage
Information retrieval
Computer systems
Servers
Data storage equipment

All Science Journal Classification (ASJC) codes

  • Software
  • Hardware and Architecture
  • Computer Vision and Pattern Recognition
  • Electrical and Electronic Engineering
  • Artificial Intelligence

Cite this

Comparison of access pattern protection schemes and proposals for efficient implementation. / Nakano, Yuto; Kiyomoto, Shinsaku; Miyake, Yutaka; Sakurai, Kouichi.

In: IEICE Transactions on Information and Systems, Vol. E97D, No. 10, 01.10.2014, p. 2576-2585.

Research output: Contribution to journalArticle

@article{55cfb01e09074b6c9036bd1982719722,
title = "Comparison of access pattern protection schemes and proposals for efficient implementation",
abstract = "Oblivious RAM (ORAM) schemes, the concept introduced by Goldreich and Ostrovsky, are very useful technique for protecting users' privacy when storing data in remote untrusted servers and running software on untrusted systems. However they are usually considered impractical due to their huge overhead. In order to reduce overhead, many improvements have been presented. Thanks to these improvements, ORAM schemes can be considered practical on cloud environment where users can expect huge storage and high computational power. Especially for private information retrieval (PIR), some literatures demonstrated they are usable. Also dedicated PIRs have been proposed and shown that they are usable in practice. Yet, they are still impractical for protecting software running on untrusted systems. We first survey recent researches on ORAM and PIR. Then, we present a practical software-based memory protection scheme applicable to several environments. The main feature of our scheme is that it records the history of accesses and uses the history to hide the access pattern. We also address implementing issues of ORAM and propose practical solutions for these issues.",
author = "Yuto Nakano and Shinsaku Kiyomoto and Yutaka Miyake and Kouichi Sakurai",
year = "2014",
month = "10",
day = "1",
doi = "10.1587/transinf.2013THP0007",
language = "English",
volume = "E97D",
pages = "2576--2585",
journal = "IEICE Transactions on Information and Systems",
issn = "0916-8532",
publisher = "一般社団法人電子情報通信学会",
number = "10",

}

TY - JOUR

T1 - Comparison of access pattern protection schemes and proposals for efficient implementation

AU - Nakano, Yuto

AU - Kiyomoto, Shinsaku

AU - Miyake, Yutaka

AU - Sakurai, Kouichi

PY - 2014/10/1

Y1 - 2014/10/1

N2 - Oblivious RAM (ORAM) schemes, the concept introduced by Goldreich and Ostrovsky, are very useful technique for protecting users' privacy when storing data in remote untrusted servers and running software on untrusted systems. However they are usually considered impractical due to their huge overhead. In order to reduce overhead, many improvements have been presented. Thanks to these improvements, ORAM schemes can be considered practical on cloud environment where users can expect huge storage and high computational power. Especially for private information retrieval (PIR), some literatures demonstrated they are usable. Also dedicated PIRs have been proposed and shown that they are usable in practice. Yet, they are still impractical for protecting software running on untrusted systems. We first survey recent researches on ORAM and PIR. Then, we present a practical software-based memory protection scheme applicable to several environments. The main feature of our scheme is that it records the history of accesses and uses the history to hide the access pattern. We also address implementing issues of ORAM and propose practical solutions for these issues.

AB - Oblivious RAM (ORAM) schemes, the concept introduced by Goldreich and Ostrovsky, are very useful technique for protecting users' privacy when storing data in remote untrusted servers and running software on untrusted systems. However they are usually considered impractical due to their huge overhead. In order to reduce overhead, many improvements have been presented. Thanks to these improvements, ORAM schemes can be considered practical on cloud environment where users can expect huge storage and high computational power. Especially for private information retrieval (PIR), some literatures demonstrated they are usable. Also dedicated PIRs have been proposed and shown that they are usable in practice. Yet, they are still impractical for protecting software running on untrusted systems. We first survey recent researches on ORAM and PIR. Then, we present a practical software-based memory protection scheme applicable to several environments. The main feature of our scheme is that it records the history of accesses and uses the history to hide the access pattern. We also address implementing issues of ORAM and propose practical solutions for these issues.

UR - http://www.scopus.com/inward/record.url?scp=84907487418&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84907487418&partnerID=8YFLogxK

U2 - 10.1587/transinf.2013THP0007

DO - 10.1587/transinf.2013THP0007

M3 - Article

AN - SCOPUS:84907487418

VL - E97D

SP - 2576

EP - 2585

JO - IEICE Transactions on Information and Systems

JF - IEICE Transactions on Information and Systems

SN - 0916-8532

IS - 10

ER -