We present a new oblivious RAM that supports variable-sized storage blocks (vORAM), which is the first ORAM to allow varying block sizes without trivial padding. We also present a new history-independent data structure (a HIRB tree) that can be stored within a vORAM. Together, this construction provides an efficient and practical oblivious data structure (ODS) for a key/value map, and goes further to provide an additional privacy guarantee as compared to prior ODS maps: even upon client compromise, deleted data and the history of old operations remain hidden to the attacker. We implement and measure the performance of our system using Amazon Web Services, and the single-operation time for a realistic database (up to $2^{18}$ entries) is ...
When multiple users and applications share the resources on cloud servers, information may be leaked...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Oblivious RAM (ORAM) is a general-purpose technique for hiding memory access patterns. This is a fun...
We present a new oblivious RAM that supports variable-sized storage blocks (vORAM), which is the fir...
Remote storage of data has become an increasingly attractive and advantageous option, especially due...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
Oblivious RAM (ORAM) is important for applications that require hiding access patterns. Many ORAM sc...
Abstract—We are among the first to systematically investigate (memory-trace) oblivious data structur...
We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which enables a cl...
Recent events have shown online service providers the perils of possessing private information about...
Write-Only Oblivious RAM (WoORAM) protocols provide privacy by encrypting the contents of data and a...
Graduation date: 2016The outsourcing of data storage and related infrastructure to third-party servi...
We formalize the notion of Verifiable Oblivious Storage (VOS), where a client outsources the storage...
We are among the first to systematically investigate (memory-trace) oblivious data struc-tures. We p...
Cloud storage services are becoming more widely used in recent decades. Lots of systems can protect ...
When multiple users and applications share the resources on cloud servers, information may be leaked...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Oblivious RAM (ORAM) is a general-purpose technique for hiding memory access patterns. This is a fun...
We present a new oblivious RAM that supports variable-sized storage blocks (vORAM), which is the fir...
Remote storage of data has become an increasingly attractive and advantageous option, especially due...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
Oblivious RAM (ORAM) is important for applications that require hiding access patterns. Many ORAM sc...
Abstract—We are among the first to systematically investigate (memory-trace) oblivious data structur...
We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which enables a cl...
Recent events have shown online service providers the perils of possessing private information about...
Write-Only Oblivious RAM (WoORAM) protocols provide privacy by encrypting the contents of data and a...
Graduation date: 2016The outsourcing of data storage and related infrastructure to third-party servi...
We formalize the notion of Verifiable Oblivious Storage (VOS), where a client outsources the storage...
We are among the first to systematically investigate (memory-trace) oblivious data struc-tures. We p...
Cloud storage services are becoming more widely used in recent decades. Lots of systems can protect ...
When multiple users and applications share the resources on cloud servers, information may be leaked...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Oblivious RAM (ORAM) is a general-purpose technique for hiding memory access patterns. This is a fun...