Secure and efficient multi-server oblivious random access machine in a malicious execution environment

A random access, server technology, applied in the direction of secure communication devices, computer security devices, instruments, etc., can solve the problems of impractical applications in the real world

Pending Publication Date: 2021-05-11
ROBERT BOSCH GMBH
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This assumption may not be practical for real-world applications where malicious adversaries may be present

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure and efficient multi-server oblivious random access machine in a malicious execution environment
  • Secure and efficient multi-server oblivious random access machine in a malicious execution environment
  • Secure and efficient multi-server oblivious random access machine in a malicious execution environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Embodiments of the disclosure are described herein. However, it is to be understood that the disclosed embodiments are examples only and that other embodiments may take various and alternative forms. The figures are not necessarily to scale; some features may be exaggerated or minimized to show details of particular components. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a representative basis for teaching one skilled in the art to variously employ the embodiments. To achieve security in the presence of malicious adversaries, aspects of the present disclosure relate to utilizing authenticated private information retrieval techniques to implement the retrieval phase of the ORAM tree paradigm, and in a shared setting utilizing an authenticated homomorphic matrix multiplication protocol its expulsion phase. As will be understood by persons of ordinary skill in the art, various features shown ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a secure and efficient multi-server oblivious random access machine in a malicious execution environment. An oblivious distributed file system is provided using an oblivious random access machine (ORAM), including an ORAM balanced tree structure, where each node in the tree is configured to store data blocks, the structure including at least two shares. The system also includes at least two ORAM servers, each of the servers configured to communicate with a client ORAM device, and programmed to facilitate storage of a different subset of the shares of the tree structure using a distributed file system and to implement an access procedure of a tree-based ORAM using the tree structure, including a retrieval phase and an eviction phase. In the retrieval phase, the servers utilize an authenticated Private Information Retrieval (PIR) protocol to retrieve data blocks as requested from the client ORAM device. In the eviction phase, the servers utilize a linear secret sharing scheme.

Description

technical field [0001] The present disclosure relates to aspects of secure and efficient multi-server inadvertent random access machines in a hostile execution environment. Background technique [0002] Oblivious Random Access Machine (ORAM) enables clients to access data stored to the cloud without revealing access patterns to the cloud provider. Existing ORAM constructs result in O( logN ) client-server communication amplification (blowup), or O(1) amplification but with expensive homomorphic encryption. To overcome these limitations, several multi-server ORAMs have been proposed, some of which provide O(1) client bandwidth amplification with efficient computation. Although such distributed ORAM techniques have their advantages, they only provide security against semi-honest adversaries. This assumption may not be practical for real-world applications where malicious adversaries may exist. Contents of the invention [0003] In one or more illustrative examples, an ob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/182G06F21/62
CPCG06F16/182G06F21/6245H04L9/085H04L2209/46H04L9/008G06F17/16
Inventor T·黄J·瓜哈尔多 莫尔钱
Owner ROBERT BOSCH GMBH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products