The Pyramid Scheme: Oblivious RAM for Trusted Processors

12/21/2017
by   Manuel Costa, et al.
0

Modern processors, e.g., Intel SGX, allow applications to isolate secret code and data in encrypted memory regions called enclaves. While encryption effectively hides the contents of memory, the sequence of address references issued by the secret code leaks information. This is a serious problem because these leaks can easily break the confidentiality guarantees of enclaves. In this paper, we explore Oblivious RAM (ORAM) designs that prevent these information leaks under the constraints of modern SGX processors. Most ORAMs are a poor fit for these processors because they have high constant overhead factors or require large private memories, which are not available in these processors. We address these limitations with a new hierarchical ORAM construction, the Pyramid ORAM, that is optimized towards online bandwidth cost and small blocks. It uses a new hashing scheme that circumvents the complexity of previous hierarchical schemes. We present an efficient x64-optimized implementation of Pyramid ORAM that uses only the processor's registers as private memory. We compare Pyramid ORAM with Circuit ORAM, a state-of-the-art tree-based ORAM scheme that also uses constant private memory. Pyramid ORAM has better online asymptotical complexity than Circuit ORAM. Our implementation of Pyramid ORAM and Circuit ORAM validates this: as all hierarchical schemes, Pyramid ORAM has high variance of access latencies; although latency can be high for some accesses, for typical configurations Pyramid ORAM provides access latencies that are 8X better than Circuit ORAM for 99 better asymptotical complexity, Pyramid ORAM has significantly lower constant overhead factors, making it the preferred choice in practice.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/19/2019

Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance

It has been a long standing problem to securely outsource computation ta...
research
04/08/2018

On the Access Complexity of PIR Schemes

Private information retrieval has been reformulated in an information-th...
research
06/25/2019

Pyramid: A General Framework for Distributed Similarity Search

Similarity search is a core component in various applications such as im...
research
11/10/2020

Coherence Traffic in Manycore Processors with Opaque Distributed Directories

Manycore processors feature a high number of general-purpose cores desig...
research
08/16/2022

Single Round-trip Hierarchical ORAM via Succinct Indices

Accesses to data stored remotely create a side channel that is known to ...
research
01/10/2023

Harvesting L2 Caches in Server Processors

We make three observations in modern processors: (1) LLC capacity is get...
research
05/12/2020

Understanding Memory Access Patterns Using the BSC Performance Tools

The growing gap between processor and memory speeds results in complex m...

Please sign up or login with your details

Forgot password? Click here to reset