What Storage Access Privacy is Achievable with Small Overhead?

04/10/2019
by   Sarvar Patel, et al.
0

Oblivious RAM (ORAM) and private information retrieval (PIR) are classic cryptographic primitives used to hide the access pattern to data whose storage has been outsourced to an untrusted server. Unfortunately, both primitives require considerable overhead compared to plaintext access. For large-scale storage infrastructure with highly frequent access requests, the degradation in response time and the exorbitant increase in resource costs incurred by either ORAM or PIR prevent their usage. In an ideal scenario, a privacy-preserving storage protocols with small overhead would be implemented for these heavily trafficked storage systems to avoid negatively impacting either performance and/or costs. In this work, we study the problem of the best storageaccess privacy that is achievable with only small overhead over plaintext access. To answer this question, we consider differential privacy access which is a generalization of the oblivious access security notion that are considered by ORAM and PIR. Quite surprisingly, we present strong evidence that constant overhead storage schemes may only be achieved with privacy budgets of ϵ = Ω( n). We present asymptotically optimal constructions for differentially private variants of both ORAM and PIR with privacy budgets ϵ = Θ( n) with only O(1) overhead. In addition, we consider a more complex storage primitive called key-value storage in which data is indexed by keys from a large universe (as opposed to consecutive integers in ORAM and PIR). We present a differentially private key-value storage scheme with ϵ = Θ( n) and O( n) overhead. This construction uses a new oblivious, two-choice hashing scheme that may be of independent interest.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/12/2023

Deciding Differential Privacy of Online Algorithms with Multiple Variables

We consider the problem of checking the differential privacy of online r...
research
04/08/2018

On the Access Complexity of PIR Schemes

Private information retrieval has been reformulated in an information-th...
research
06/18/2021

Differentially private sparse vectors with low error, optimal space, and fast access

Representing a sparse histogram, or more generally a sparse vector, is a...
research
10/30/2018

Private Algorithms Can be Always Extended

We consider the following fundamental question on ϵ-differential privacy...
research
03/18/2023

The Challenge of Differentially Private Screening Rules

Linear L_1-regularized models have remained one of the simplest and most...
research
04/23/2018

Succinct Oblivious RAM

Reducing the database space overhead is critical in big-data processing....
research
02/14/2018

Sub-logarithmic Distributed Oblivious RAM with Small Block Size

Oblivious RAM (ORAM) is a cryptographic primitive that allows a client t...

Please sign up or login with your details

Forgot password? Click here to reset