Paper 2019/384
What Storage Access Privacy is Achievable with Small Overhead?
Sarvar Patel, Giuseppe Persiano, and Kevin Yeo
Abstract
Oblivious RAM (ORAM) and private information retrieval (PIR) are classic cryptographic primitives used to hide the access pattern to data whose storage has been outsourced to an untrusted server. Unfortunately, both primitives require considerable overhead compared to plaintext access. For large-scale storage infrastructure with highly frequent access requests, the degradation in response time and the exorbitant increase in resource costs incurred by either ORAM or PIR prevent their usage. In an ideal scenario, a privacy-preserving storage protocols with small overhead would be implemented for these heavily trafficked storage systems to avoid negatively impacting either performance and/or costs. In this work, we study the problem of the best
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Minor revision. ACM-PODS-2019
- Keywords
- oblivious RAMdifferential privacylower boundsoblivious hashing
- Contact author(s)
- kwlyeo @ google com
- History
- 2019-04-16: received
- Short URL
- https://ia.cr/2019/384
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2019/384, author = {Sarvar Patel and Giuseppe Persiano and Kevin Yeo}, title = {What Storage Access Privacy is Achievable with Small Overhead?}, howpublished = {Cryptology {ePrint} Archive, Paper 2019/384}, year = {2019}, url = {https://eprint.iacr.org/2019/384} }