a survey of oblivious rams
play

A Survey of Oblivious RAMs David Cash IBM Securely Outsourcing - PowerPoint PPT Presentation

A Survey of Oblivious RAMs David Cash IBM Securely Outsourcing Memory Server Goal : Store, access, and update data on an untrusted server. Mem[0] a Mem[1] b Mem[2] c Write(i,x) Read(j) Mem[i] d Client Mem[j] e Untrusted


  1. A Survey of Oblivious RAMs David Cash IBM

  2. Securely Outsourcing Memory Server Goal : Store, access, and update data on an untrusted server. Mem[0] a Mem[1] b Mem[2] c Write(i,x) Read(j) Mem[i] d Client Mem[j] e “Untrusted” means: • It may not implement Write/Read properly • It will try to learn about data Mem[N-1] y Mem[N] z 2

  3. Oblivious RAMs Server An ORAM emulator is an intermediate layer that protects any client (i.e. program). Mem[0] a Op 1 (arg 1 ) Mem[1] b Op(arg) x 1 Mem[2] c Op t (arg t ) e x t Client Client Cache Mem[i] d ORAM will issue operations that deviate from actual client requests. Mem[j] e Correctness : If server is honest then input/ output behavior is same for client. Security : Server cannot distinguish between Mem[N-1] two clients with same running time. Mem[N] 3

  4. Simplifying Assumptions Assumption #1 : Server does not see data. Store an encryption key on emulator and re-encrypt on every read/write. Assumption #2: Server does not see op (read vs write). Every op is replaced with both a read and a write. Assumption #3 : Server is honest-but-curious. Store a MAC key on emulator and sign (address, time, data) on each op... (more on this later) 4

  5. ORAM Security What’s left to protect is the “access pattern” of the program. Server Op 1 (j 1 ) Op 1 (i 1 ) Op 1 (j 2 ) Op 2 (i 2 ) Op n (i n ) Client Op T (j T ) Cache Definition : The access pattern generated by a sequence (i 1 , ..., i n ) with the ORAM emulator is the random variable (j 1 , ... , j T ) sampled while running with an honest server. Definition : An ORAM emulator is secure if for every pair of sequences of the same length, their access patterns are indistinguishable. 5

  6. Enforcing Honest-but-Curious Servers Assumption #3 : Server is honest-but-curious. Store a MAC key on client and sign (addr, time, data) on each op... Simple authentication does not work : What do we check with timestamp? It does work if scheme supports “time labeled simulation” Means system can calculate “last touched” time for each index at all times. Then can check if server returned correct (addr, time, data) Some of the recent papers might not support this. 6

  7. Information-Theoretic ORAM • There exist non-trivial information-theoretically secure ORAMs • Ajtai’10 and Damgaard, Meldgaard, Nielsen’10 gave schemes • Mostly of interest for complexity theory, i.e. actually simulating a RAM • For outsourcing memory, we still need cryptographic assumptions for the encryption and authentication • Thus we ignore these less efficient schemes today 7

  8. ORAM vs Private Info Retrieval (PIR) PIR: Oblivious transfer without sender security (i.e. receiver may learn more than requested index) Some differences: In ORAM... In PIR... Server data changes Server data does not with each operation change Server only performs Server performs simple read/write ops “heavier” computation Client may keep state Client does not keep between queries state 8

  9. ORAM Efficiency Measures Parameter: N - number of memory slots Efficiency measures: • Amortized overhead : # ops issued by ORAM simulator divided by # of ops issued by client • Worst-case overhead : max # ops issued by ORAM simulator to respond to any given call by program • Storage : # of memory slots used in server • Client storage : # of slots stored in ORAM emulator between ops • Client memory: max # of slots used in temp memory during processing of an op Can also look at scaling with size of memory slots. (Not today) 9

  10. Uninteresting ORAMs Example #1 : Store everything in ORAM simulator cache and simulate with no calls to server. Client storage = N. Example #2 : Store memory on server, but scan entire memory on every operation. Amortized and worst-case communication overhead = N. Example #3 : Assume client accesses each memory slot at most once, and then permute addresses using a PRP. Essentially optimal, but assumption does not hold in practice. 10

  11. Lower Bounds Theorem (GO’90): Any ORAM emulator must perform Ω (t log t) operations to simulate t operations. Proved via a combinatorial argument. Theorem (BM’10): Any ORAM emulator must either perform Ω (t log t log log t) operations to simulate t operations or use storage Ω (N 2-o(1) ) (on the server). They actually prove more for other computation models. 11

  12. ORAM Efficiency Goals In order to be interesting , an ORAM must simultaneously provide • o(N) client storage • o(N) amortized overhead • Handling of repeated access to addresses. Desirable features for an “optimal ORAM”: • O(log N) worst-case overhead • O(1) client storage between operations • O(1) client memory usage during operations • “Stateless client”: Allows several clients who share a short key to obliviously access data w/o communicating amongst themselves between queries. Requires op counters. 12

  13. History of ORAMs • Pippenger and Fischer showed “oblivious Turing machines” could simulate general Turing machines • Goldreich introduced analogous notion of ORAMs in ’87 and gave first interesting construction • Ostrovsky gave a more efficient construction in ’90 • ... 20 years pass, time sharing systems become “clouds” ... • Then a flurry of papers improving efficiency: ~10 since 2010 13

  14. ORAM Literature Overview Nickname Client Memory Client Storage Server Storage Worst-Case Overhead Amortized Overhead O ( n log 2 n ) O ( √ n log 2 n ) G’87 “ √ n ” O (1) O (1) O ( n ) O ( n log 2 n ) O (log 3 n ) O’90 “Hierarchical” O (1) O (1) O ( n log n ) O ( √ n log 2 n ) O ( √ n log 2 n ) OS’97 “Unamortized √ n ” O (1) O (1) O ( n ) O (log 3 n ) O (log 3 n ) OS’97 “Unamortized Hierarchical” O (1) O (1) O ( n log n ) O (log 2 n ) WS’08 “Merge sort ” O ( √ n ) O ( √ n ) O ( n log n ) O ( n log n ) O (log 2 n ) GM’11 “Cuckoo 1” O (1) O (1) O ( n ) O ( n ) O (log 2 n/ log log n ) KLO’11 “Cuckoo virtual stash” O (1) O (1) O ( n ) O ( n ) O ( n δ ) O ( n δ ) GM’11 “Cuckoo 2” O ( n ) O ( n ) O (log n ) O ( √ n log 2 n ) O ( √ n log 2 n ) GMOT’11 “Republishing OS’97 Pt 1” O (1) O (1) O ( n ) O ( n δ ) GMOT’11 “Extending OS’97” O (1) O ( n ) O (log n ) O (log n ) O (log 3 n ) O (log 3 n ) SCSL’11 “Binary Tree” O (1) O (1) O ( n log n ) O ( n δ ) GMOT’12 “Cuckoo+” O (1) O ( n ) O ( n ) O (log n ) O (log 2 n ) SSS’12 “Parallel Bu ff ers ” O ( √ n ) O ( √ n ) O ( n ) O ( √ n ) You? “Optimal” O (1) O (1) O ( n ) O (log n ) O (log n ) = covered in this talk • Omitted insecure schemes • Notably, Pinkas-Reinman (Crypto’10) • All of these are extensions of G’87 and O’90, except SCSL’11 and SSS’12 • No optimal construction known • SSS’12 claims to be most practical, despite bad asymptotics 14

  15. Outline 1. Goldreich’s “Square Root” ORAM & Extensions 2. Ostrovsky’s “Hierarchical” ORAM & Extensions 3. Cuckoo Hashing ORAMs: Scheme and Attack 4. A “Practical ORAM” 15

  16. Outline 1. Goldreich’s “Square Root” ORAM & Extensions 2. Ostrovsky’s “Hierarchical” ORAM & Extensions 3. Cuckoo Hashing ORAMs: Scheme and Attack 4. A “Practical ORAM” 16

  17. Basic Tool: Oblivious Shuffling Claim : Given any permutation π on {1 , ... , N}, we can permute the data according to π with a sequence of ops that does not depend on the data or π . This means we move data at address i to address π (i). Proof idea : Use an oblivious sorting algorithm . For each comparison in the sort, read both positions and rewrite them, either swapping the data or not (depending on if π (i) > π (j)). 17

  18. Basic Tool: Oblivious Shuffling Claim : Given any permutation π on {1 , ... , N}, we can permute the data according to π with a sequence of ops that does not depend on the data or π . This means we move data at address i to address π (i). Proof idea : Use an oblivious sorting algorithm . For each comparison in the sort, read both positions and rewrite them, either swapping the data or not (depending on if π (i) > π (j)). Batcher sorting network: O(N log 2 N) comparisons, fast AKS sorting network : O(N log N) comparisons, slow in practice Randomized Shell sort : O(N log N) comparisons, fast, sorts w.p. 1 - 1/poly - Concrete security loss? 18

  19. Basic Tool: Oblivious Shuffling Claim : Given any permutation π on {1 , ... , N}, we can permute the data according to π with a sequence of ops that does not depend on the data or π . Corollary : Given a key K for a PRP F, we can permute the data according to F(K, · ) using O(1) client memory with a sequence of O(N log N) ops that does not depend on the data or K. Note : Using O(N) client memory we can do this with O(N) ops by reading everything, permuting locally, and then uploading. 19

  20. A Simple ORAM Using Shuffling Shuffle hides everything, Server storage : N + C slots assuming we never Client storage : C slots repeat a read. Initialization: Pick PRP key. Use it to N data slots obliviously shuffle N data slots together with C “dummy” slots. To read/write a slot: • If data is not in client storage, On repeats we still read read it from DB C dummy slots a new slot • If data is in client storage, read next dummy slot • Write data into client storage 20

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend