File(s) not publicly available
Analysis of path ORAM toward practical utilization
conference contribution
posted on 2018-07-24, 00:00 authored by Steven GordonSteven Gordon, A Miyaji, C Su, K SumongkayyothinOblivious RAM is known as a secure protocol for hiding client's access pattern from an untrusted server. However, the current ORAM algorithms still incur large computation, storage and communication overheads. For this reason, investigation of the ORAM limitations and methods to improve efficiency in real-world environments is necessary. In this paper we focus on one of the leading algorithms, Path ORAM, and propose an efficient implementation. Specifically we analyse the selection of encryption algorithms, concluding the use of AES-GCM to avoid duplication of blocks on the server. Also we propose extending Path ORM by using local caching on the client to reduce communication overhead. Experimental results from our Python implementation show key tradeoffs for ORAM design.
Funding
Other
History
Editor
Barolli L; Takizawa M; Hsu H; Enokido T; Xhafa FParent Title
Proceedings: 2015 18th International Conference on Network-Based Information SystemsStart Page
646End Page
651Start Date
2015-09-02Finish Date
2015-09-04ISBN-13
9781479999422Location
Taipai, TaiwanPublisher
IEEEPlace of Publication
Piscataway, NJPublisher DOI
Full Text URL
Peer Reviewed
- Yes
Open Access
- No
External Author Affiliations
Japan Advanced Institute of Science and Technology; Japan Science and Technology AgencyEra Eligible
- Yes
Name of Conference
2015 18th International Conference on Network-Based Information Systems: NBiS 2015Usage metrics
Categories
Keywords
cache storagecryptographic protocolsmemory architecturerandom-access storageAES-GCMORAM algorithmsORAM designORAM limitationsORAM methodsPython implementationblocks duplicationclient access patterncommunication overheadsencryption algorithmslocal cachingoblivious RAMpath ORAMreal-world environmentssecure protocolstorage overheadsuntrusted serverAlgorithm design and analysisCloud computingEncryptionProtocolsRandom access memoryServersImplementation AnalysisORAMSecurity ProtocolComputer System Security