TY - GEN
T1 - Revisiting Secure Multi-Server Oblivious RAMs
AU - Kwak, Chaewon
AU - Ahn, Kangmo
AU - Hahn, Changhee
AU - Koo, Dongyoung
AU - Hur, Junbeom
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024
Y1 - 2024
N2 - Oblivious RAM (ORAM) facilitates search and update on outsourced encrypted databases without leaking access patterns. Since ORAM typically requires large client storage and high computational overhead, many studies proposed more efficient ORAM schemes. For example, Thang et al. proposed a multi-server ORAM, S3ORAM, by utilizing Shamir's secret sharing and secure multi-party computation, instead of fully homomorphic encryption to enhance the efficiency. However, recent studies show that Shamir's secret sharing is no longer secure in Galois Fields. To solve this security problem while achieving the efficiency, we propose two ORAM schemes: (1) BSS-ORAM by applying Blakley's secret sharing to S3ORAM, aiming to improve security with high efficiency, and (2) VH-BSS-ORAM, which further prevents size pattern leakage by storage padding. According to our analysis, BSS-ORAM is secure in Galois Fields with the same computational overhead of S3ORAM; and VH-BSS-ORAM further hides size pattern with higher overhead compared to S3ORAM.
AB - Oblivious RAM (ORAM) facilitates search and update on outsourced encrypted databases without leaking access patterns. Since ORAM typically requires large client storage and high computational overhead, many studies proposed more efficient ORAM schemes. For example, Thang et al. proposed a multi-server ORAM, S3ORAM, by utilizing Shamir's secret sharing and secure multi-party computation, instead of fully homomorphic encryption to enhance the efficiency. However, recent studies show that Shamir's secret sharing is no longer secure in Galois Fields. To solve this security problem while achieving the efficiency, we propose two ORAM schemes: (1) BSS-ORAM by applying Blakley's secret sharing to S3ORAM, aiming to improve security with high efficiency, and (2) VH-BSS-ORAM, which further prevents size pattern leakage by storage padding. According to our analysis, BSS-ORAM is secure in Galois Fields with the same computational overhead of S3ORAM; and VH-BSS-ORAM further hides size pattern with higher overhead compared to S3ORAM.
KW - Blakley's secret sharing
KW - information leakage
KW - Oblivious RAM
KW - searchable encryption
UR - http://www.scopus.com/inward/record.url?scp=85198335617&partnerID=8YFLogxK
U2 - 10.1109/ICOIN59985.2024.10572175
DO - 10.1109/ICOIN59985.2024.10572175
M3 - Conference contribution
AN - SCOPUS:85198335617
T3 - International Conference on Information Networking
SP - 469
EP - 472
BT - 38th International Conference on Information Networking, ICOIN 2024
PB - IEEE Computer Society
T2 - 38th International Conference on Information Networking, ICOIN 2024
Y2 - 17 January 2024 through 19 January 2024
ER -