TY - JOUR
T1 - Comparison of access pattern protection schemes and proposals for efficient implementation
AU - Nakano, Yuto
AU - Kiyomoto, Shinsaku
AU - Miyake, Yutaka
AU - Sakurai, Kouichi
N1 - Publisher Copyright:
Copyright © 2014 The Institute of Electronics, Information and Communication Engineers.
PY - 2014/10/1
Y1 - 2014/10/1
N2 - Oblivious RAM (ORAM) schemes, the concept introduced by Goldreich and Ostrovsky, are very useful technique for protecting users' privacy when storing data in remote untrusted servers and running software on untrusted systems. However they are usually considered impractical due to their huge overhead. In order to reduce overhead, many improvements have been presented. Thanks to these improvements, ORAM schemes can be considered practical on cloud environment where users can expect huge storage and high computational power. Especially for private information retrieval (PIR), some literatures demonstrated they are usable. Also dedicated PIRs have been proposed and shown that they are usable in practice. Yet, they are still impractical for protecting software running on untrusted systems. We first survey recent researches on ORAM and PIR. Then, we present a practical software-based memory protection scheme applicable to several environments. The main feature of our scheme is that it records the history of accesses and uses the history to hide the access pattern. We also address implementing issues of ORAM and propose practical solutions for these issues.
AB - Oblivious RAM (ORAM) schemes, the concept introduced by Goldreich and Ostrovsky, are very useful technique for protecting users' privacy when storing data in remote untrusted servers and running software on untrusted systems. However they are usually considered impractical due to their huge overhead. In order to reduce overhead, many improvements have been presented. Thanks to these improvements, ORAM schemes can be considered practical on cloud environment where users can expect huge storage and high computational power. Especially for private information retrieval (PIR), some literatures demonstrated they are usable. Also dedicated PIRs have been proposed and shown that they are usable in practice. Yet, they are still impractical for protecting software running on untrusted systems. We first survey recent researches on ORAM and PIR. Then, we present a practical software-based memory protection scheme applicable to several environments. The main feature of our scheme is that it records the history of accesses and uses the history to hide the access pattern. We also address implementing issues of ORAM and propose practical solutions for these issues.
UR - http://www.scopus.com/inward/record.url?scp=84907487418&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84907487418&partnerID=8YFLogxK
U2 - 10.1587/transinf.2013THP0007
DO - 10.1587/transinf.2013THP0007
M3 - Article
AN - SCOPUS:84907487418
SN - 0916-8532
VL - E97D
SP - 2576
EP - 2585
JO - IEICE Transactions on Information and Systems
JF - IEICE Transactions on Information and Systems
IS - 10
ER -