2011
DOI: 10.1007/978-3-642-22012-8_46
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation

Abstract: Suppose a client, Alice, has outsourced her data to an external storage provider, Bob, because he has capacity for her massive data set, of size n, whereas her private storage is much smaller-say, of size O(n 1/r ), for some constant r > 1. Alice trusts Bob to maintain her data, but she would like to keep its contents private. She can encrypt her data, of course, but she also wishes to keep her access patterns hidden from Bob as well. We describe schemes for the oblivious RAM simulation problem with a small lo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
223
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 161 publications
(229 citation statements)
references
References 40 publications
0
223
0
Order By: Relevance
“…[3][4][5][6][7][8][9][10]12,14]. These ORAMs only have little state information, such as secret keys and query counters, stored in local storage.…”
Section: Related Workmentioning
confidence: 99%
“…[3][4][5][6][7][8][9][10]12,14]. These ORAMs only have little state information, such as secret keys and query counters, stored in local storage.…”
Section: Related Workmentioning
confidence: 99%
“…Oblivious RAM (ORAM) was first proposed by Goldreich and Ostrovsky [21], and later improved in a series of works [13,14,17,20,[22][23][24]26,[28][29][30][31][33][34][35][36][37]. Recently, ORAM has been used in outsourcing storage [22,35,37], and in secure two-party computation to achieve sublinear amortized cost [17,25].…”
Section: Related Workmentioning
confidence: 99%
“…Recently, ORAM has been used in outsourcing storage [22,35,37], and in secure two-party computation to achieve sublinear amortized cost [17,25].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In particular, it is common in cryptographic applications to aim for negligible failure probabilities. For example, cuckoo structures with negligible failure probabilities have recently found applications in oblivious RAM simulations [16]. Moreover, a significant motivation for de-amortized cuckoo hashing is to prevent timing attacks and clocked adversaries from compromising a system [3].…”
Section: Introductionmentioning
confidence: 99%