Security

Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors

Download Now Free registration required

Executive Summary

Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One paradigm to achieve data privacy is to use tamper-resistant processors, inside which users' private data is decrypted and computed upon. These processors need to interact with untrusted external memory. Even if the authors encrypt all data that leaves the trusted processor, however, the address sequence that goes o -chip may still leak information. To prevent this address leakage, the security community has proposed ORAM (Oblivious RAM).

  • Format: PDF
  • Size: 2842.97 KB