Abstract
Many companies choose the cloud as their data and IT infrastructure platform. The remote access of the data brings the issue of trust. Despite the use of strong encryption schemes, adversaries can still learn valuable information regarding encrypted data by observing the data access patterns. To that end, one can hide the access patterns, which may leak sensitive information, using Oblivious RAMs (ORAMs). Numerous works have proposed different ORAM constructions, but they have never been thoroughly compared against and tested on large databases. There are also no open source implementation of these schemes. These limitations make it difficult for researchers and practitioners to choose and adopt a suitable ORAM for their applications. To address this issue, we provide a thorough study over several practical ORAM constructions, and implement them under the same library. We perform extensive experiments to provide insights into their performance characteristics with respect to efficiency, scalability, and communication cost.
Original language | English (US) |
---|---|
Pages (from-to) | 1113-1124 |
Number of pages | 12 |
Journal | Proceedings of the VLDB Endowment |
Volume | 9 |
Issue number | 12 |
DOIs | |
State | Published - 2016 |
Event | 42nd International Conference on Very Large Data Bases, VLDB 2016 - New Delhi, India Duration: Sep 5 2016 → Sep 9 2016 |
All Science Journal Classification (ASJC) codes
- Computer Science (miscellaneous)
- General Computer Science