EHAP-ORAM: Efficient Hardware-Assisted Persistent ORAM System for Non-volatile Memory

11/07/2020
by   Gang Liu, et al.
0

Oblivious RAM (ORAM) protected access pattern is essential for secure NVM. In the ORAM system, data and PosMap metadata are maps in pairs to perform secure access. Therefore, we focus on the problem of crash consistency in the ORAM system. Unfortunately, using traditional software-based support for ORAM system crash consistency is not only expensive, it can also lead to information leaks. At present, there is no relevant research on the specific crash consistency mechanism supporting the ORAM system. To support crash consistency without damaging ORAM system security and compromising the performance, we propose EHAP-ORAM. Firstly, we analyze the access steps of basic ORAM to obtain the basic requirements to support the ORAM system crash consistency. Secondly, improve the ORAM controller. Thirdly, for the improved hardware system, we propose several persistence protocols supporting the ORAM system crash consistency. Finally, we compared our persistent ORAM with the system without crash consistency support, non-recursive and recursive EHAP-ORAM only incurs 3.36 supports effective crash consistency with minimal performance and hardware overhead but also is friendly to NVM lifetime.

READ FULL TEXT

page 2

page 4

page 7

page 8

page 9

page 12

page 13

page 14

research
05/10/2017

Improving the Performance and Endurance of Persistent Memory with Loose-Ordering Consistency

Persistent memory provides high-performance data persistence at main mem...
research
12/26/2020

Persistence and Synchronization: Friends or Foes?

Emerging non-volatile memory (NVM) technologies promise memory speed byt...
research
10/20/2018

Triad-NVM: Persistent-Security for Integrity-Protected and Encrypted Non-Volatile Memories (NVMs)

Emerging Non-Volatile Memories (NVMs) are promising contenders for build...
research
05/24/2019

PACStack: an Authenticated Call Stack

A popular run-time attack technique is to compromise the control-flow in...
research
03/29/2018

Migrating SGX Enclaves with Persistent State

Hardware-supported security mechanisms like Intel Software Guard Extensi...
research
08/19/2022

Usable Security for an IoT OS: Integrating the Zoo of Embedded Crypto Components Below a Common API

IoT devices differ widely in crypto-supporting hardware, ranging from no...
research
07/08/2022

Strong Anonymity for Mesh Messaging

Messaging systems built on mesh networks consisting of smartphones commu...

Please sign up or login with your details

Forgot password? Click here to reset