Cryptology ePrint Archive: Report 2020/203

MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework

Thang Hoang and Jorge Guajardo and Attila A. Yavuz

Abstract: Oblivious Random Access Machine (ORAM) allows a client to hide the access pattern and thus, offers a strong level of privacy for data outsourcing. An ideal ORAM scheme is expected to offer desirable properties such as low client bandwidth, low server computation overhead and the ability to compute over encrypted data. S3ORAM (CCS’17) is an efficient active ORAM scheme, which takes advantage of secret sharing to provide ideal properties for data outsourcing such as low client bandwidth, low server computation and low delay. Despite its merits, S3ORAM only offers security in the semi-honest setting. In practice, an ORAM protocol is likely to operate in the presence of malicious adversaries who might deviate from the protocol to compromise the client privacy.

In this paper, we propose MACAO, a new multi-server ORAM framework, which offers integrity, access pattern obliviousness against active adversaries, and the ability to perform secure computation over the accessed data. MACAO harnesses authenticated secret sharing techniques and tree-ORAM paradigm to achieve low client communication, efficient server computation, and low storage overhead at the same time. We fully implemented MACAO and conducted extensive experiments in real cloud platforms (Amazon EC2) to validate the performance of MACAO compared with the state-of-the-art. Our results indicate that MACAO can achieve comparable performance to S3ORAM while offering security against malicious adversaries. MACAO is a suitable candidate for integration into distributed file systems with encrypted computation capabilities towards enabling an oblivious functional data outsourcing infrastructure.

Category / Keywords: cryptographic protocols / Oblivious RAM, secret sharing, multi-party computation, privacy-enhancing technologies

Original Publication (in the same form): Network and Distributed Systems Security (NDSS) Symposium 2020
DOI:
10.14722/ndss.2020.24313

Date: received 17 Feb 2020, last revised 21 Feb 2020

Contact author: hoangm at mail usf edu

Available format(s): PDF | BibTeX Citation

Version: 20200221:223029 (All versions of this report)

Short URL: ia.cr/2020/203


[ Cryptology ePrint archive ]