Proceedings of the 38th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems 2019
DOI: 10.1145/3294052.3319695
|View full text |Cite
|
Sign up to set email alerts
|

What Storage Access Privacy is Achievable with Small Overhead?

Abstract: Oblivious RAM (ORAM) and private information retrieval (PIR) are classic cryptographic primitives used to hide the access pattern to data whose storage has been outsourced to an untrusted server. Unfortunately, both primitives require considerable overhead compared to plaintext access. For large-scale storage infrastructure with highly frequent access requests, the degradation in response time and the exorbitant increase in resource costs incurred by either ORAM or PIR prevent their usage. In an ideal scenario… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 58 publications
0
8
0
Order By: Relevance
“…To avoid this extra storage, we can utilize a modified version of two-choice hashing introduced by Patel et al [33] that we denote by H 2ch . This hashing scheme reduces the amount of unused space by arranging bins to share physical memory.…”
Section: Ch: Warm-up Schemementioning
confidence: 99%
See 1 more Smart Citation
“…To avoid this extra storage, we can utilize a modified version of two-choice hashing introduced by Patel et al [33] that we denote by H 2ch . This hashing scheme reduces the amount of unused space by arranging bins to share physical memory.…”
Section: Ch: Warm-up Schemementioning
confidence: 99%
“…Whenever a value is inserted into two bins that are completely filled (all nodes appearing on the unique leaf-to-root paths are occupied), the item is instead placed into the stash. We formally present bounds on the stash size and point readers to the proof in [33]. Theorem 3 ([33]).…”
Section: Ch: Warm-up Schemementioning
confidence: 99%
“…There are two approaches to oblivious data access todaythe classical ORAM [10][11][12][13][14][15][16][17], and more recent approach of frequency smoothing as in Pancake [6,18,19]. ORAMs are designed to prevent a broad range of attacks (e.g., active adversaries); accordingly, they also suffer from high overheads, e.g., recent results [20][21][22][23][24][25] have established strong lower bounds on ORAM overheads-for a data store with n KV pairs, any ORAM design must incur bandwidth overheads of Ω(log n) (for proxy storage sublinear in KV store size). For KV stores that store millions or billions of KV pairs, these overheads may amount to orders-of-magnitude of throughput loss [6,37], making ORAMs impractical.…”
Section: Oblivious Data Access Approachesmentioning
confidence: 99%
“…• Bandwidth and/or compute scalability bottlenecks: Since the proxy receives multiple responses for each client query, it has bandwidth overheads (Ω(log n) in ORAM [20][21][22][23][24][25] and 3× in Pancake [6]); and, since the proxy is responsible for both data encryption/decryption and processing for each individual query and response, it has non-trivial compute overheads. Thus, the centralized proxy can become bandwidth or compute bottlenecked, limiting system throughput.…”
Section: Introductionmentioning
confidence: 99%
“…Many adaptations of DP simply change the neighborhood definition to protect different types of input data than datasets. DP was adopted to graph-structured data in [38,85,136,140,144,151,153], to streaming data in [51,55,56,64,102], to symbolic control systems in [93], to text vectors in [175], to set operations in [172], to images in [174], to genomic data in [147], to recommendation systems in [80], to machine learning in [119], to location data in [28], to outsourced database systems in [101], to bandit algorithms in [12,156], to RAMs in [3,21,158] and to Private Information Retrieval in [135,155]. We detail the corresponding definitions in the full version of this work.…”
Section: Applying the Definition To Other Types Of Inputmentioning
confidence: 99%