Efficient Oblivious Database Joins

03/20/2020
by   Simeon Krastnikov, et al.
0

A major algorithmic challenge in designing applications intended for secure remote execution is ensuring that they are oblivious to their inputs, in the sense that their memory access patterns do not leak sensitive information to the server. This problem is particularly relevant to cloud databases that wish to allow queries over the client's encrypted data. One of the major obstacles to such a goal is the join operator, which is non-trivial to implement obliviously without resorting to generic but inefficient solutions like Oblivious RAM (ORAM). We present an oblivious algorithm for equi-joins which (up to a logarithmic factor) matches the optimal O(nlog n) complexity of the standard non-secure sort-merge join (on inputs producing O(n) outputs). We do not use use expensive primitives like ORAM or rely on unrealistic hardware or security assumptions. Our approach, which is based on sorting networks and novel provably-oblivious constructions, is conceptually simple, easily verifiable, and very efficient in practice. Its data-independent algorithmic structure makes it secure in various different settings for remote computation, even in those that are known to be vulnerable to certain side-channel attacks (such as Intel SGX) or with strict requirements for low circuit complexity (like secure multiparty computation). We confirm that our approach is easily realizable through a compact prototype implementation which matches our expectations for performance and is shown, both formally and empirically, to possess the desired security characteristics.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/13/2020

Panda: Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data

Despite extensive research on cryptography, secure and efficient query p...
research
06/29/2021

undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation

The ongoing trend of moving data and computation to the cloud is met wit...
research
04/20/2022

BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking

We present Blinded Memory (BliMe), a way to realize efficient and secure...
research
02/12/2020

EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database using Enclaves

Data confidentiality is an important requirement for clients when outsou...
research
06/08/2022

A Framework for Building Secure, Scalable, Networked Enclaves

In 2020, Amazon introduced Nitro enclaves – cloud-based secure enclaves ...
research
10/01/2018

Privado: Practical and Secure DNN Inference

Recently, cloud providers have extended support for trusted hardware pri...
research
12/20/2019

Reverse Fingerprinting

Software connected to the Internet is an attractive target for attackers...

Please sign up or login with your details

Forgot password? Click here to reset