Skip to content
This repository was archived by the owner on May 2, 2025. It is now read-only.
This repository was archived by the owner on May 2, 2025. It is now read-only.

Methods of access pattern attacks mitigation #9

@michwill

Description

@michwill

In ZeroDB, we do leak access patterns which could reduce security to that of CryptDB for an observer who watches access patterns over infinite time. Here are proposals of how to mitigate that.

FWIW, here are a couple relevant papers from a quick search

Jamey Sharp from twitter

What are the most efficient ORAMs now? If you assume non-colluding servers, you may find "Multi-Cloud Oblivious Storage" by Emil Stefanov and Elaine Shi interesting. If you have only one server, you may want to look at our work on Onion ORAM and a follow-up worked called C-ORAM. Be careful with the latter though. It improved upon our construction, but it has bugs and omitted many optimizations and details.

Ling Ren and others from MIT

If you have a good way to measure
the leakage, then the solution is to just re-shuffle the database when
the leakage approaches some limit (with traditional ORAM, the
reshuffling is done in conjunction with other design elements to
eliminate any leakage; but, I think there is an interesting design point
to look for solutions that are permitted to leak some limited amount of
information).

Dave Evans from University of Virginia

The last one assumes that it is, at least, important to have an estimate of leakage first. May be some minor pattern leakage can be permitted (until data a re-shuffled). Rate of natural leakage mitigation by, effectively, splitting buckets of B-Trees while using the DB is also interesting to know

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions