Shroud aggressively targets hiding accesses among hundreds of terabytes of data. We achieve our goals by adapting oblivious RAM (ORAM) algorithms to enable large-scale parallelization. Specifically, we show, via new techniques such as oblivious aggregation, how to securely use many inexpensive secure coprocessors acting in parallel to improve request latency. Our evaluation combines large-scale emulation with an implementation on secure coprocessors and suggests that these adaptations bring private data access closer to practicality.
Category / Keywords: applications / Oblivious RAM, ORAM, Parallelism, Secure Hardware, Implementation Publication Info: An abridged version appears in the Proceedings of the USENIX Conference on File and Storage Technologies (FAST), 2013 Date: received 9 Mar 2012, last revised 16 Jan 2013 Contact author: parno at microsoft com Available formats: PDF | BibTeX Citation Note: Updated with additional proofs and empirical results. Version: 20130117:032459 (All versions of this report) Discussion forum: Show discussion | Start new discussion