Storage

Building Castles Out of Mud: Practical Access Pattern Privacy and Correctness on Untrusted Storage

Download Now Free registration required

Executive Summary

The authors introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted reads, writes, and inserts to a potentially curious and malicious storage service provider, without revealing information or access patterns. The provider is unable to establish any correlation between successive accesses, or even to distinguish between a read and a write. Moreover, the client is provided with strong correctness assurances for its operations - illicit provider behavior does not go undetected.

  • Format: PDF
  • Size: 464.8 KB