Show simple item record

dc.contributor.advisorSrinivas Devadas.en_US
dc.contributor.authorRen, Ling, Ph. D. Massachusetts Institute of Technologyen_US
dc.contributor.otherMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Science.en_US
dc.date.accessioned2015-02-05T15:58:55Z
dc.date.available2015-02-05T15:58:55Z
dc.date.copyright2014en_US
dc.date.issued2014en_US
dc.identifier.urihttp://hdl.handle.net/1721.1/93780
dc.descriptionThesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014.en_US
dc.descriptionThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.en_US
dc.descriptionCataloged from student-submitted PDF version of thesis.en_US
dc.descriptionIncludes bibliographical references (pages 61-66).en_US
dc.description.abstractOblivious RAM (ORAM) is a cryptographic primitive that conceals memory access patterns to untrusted storage. Its applications include oblivious cloud storage, trusted processors, software protection, secure multi-party computation, and so on. This thesis improves the state-of-the-art Path ORAM in several aspects. On the theoretical side, we improve Path ORAM's memory bandwidth overhead by a factor of O(log logN) when the block size is small. With this improvement, Path ORAM is asymptotically the most ecient ORAM construction with constant or polylogarithmic client storage under any block size. Our technique to achieve this improvement involves using pseudorandom functions to compress the position map, a central component in Path ORAM and other position-based ORAMs. With small block size, managing the position map has huge overhead and is Path ORAM's performance bottleneck. Our technique reduces this overhead. On the practical side, we propose Unified ORAM with a position map lookaside buffer to utilize locality in real-world applications, while preserving access pattern privacy. We also propose a new variant of Path ORAM named RAW Path ORAM, which achieves a constant factor reduction in memory bandwidth and encryption overhead. It also features a much simpler proof for correctness compared with Path ORAM. Combining our techniques results in a roughly 2 improvement in ORAM bandwidth, and over 1.43 speedup on SPEC benchmarks. We also study how to eciently verify the integrity of ORAM. Besides some customized optimizations for Path ORAM and RAW Path ORAM, we present a novel integrity verification scheme that works for any position-based ORAM and achieves an asymptotic reduction in hashing overhead over prior solutions.en_US
dc.description.statementofresponsibilityby Ling Ren.en_US
dc.format.extent66 pagesen_US
dc.language.isoengen_US
dc.publisherMassachusetts Institute of Technologyen_US
dc.rightsM.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission.en_US
dc.rights.urihttp://dspace.mit.edu/handle/1721.1/7582en_US
dc.subjectElectrical Engineering and Computer Science.en_US
dc.titleUnified RAW Path Oblivious RAMen_US
dc.title.alternativeUnified Random Access Memory Path Oblivious Random Access Memoryen_US
dc.typeThesisen_US
dc.description.degreeS.M.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
dc.identifier.oclc900736861en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record