Summary

The 2018 International Symposium on Information Theory and Its Applications (ISITA2018)

2018

Session Number:We-AM-1-2

Session:

Number:We-AM-1-2.1

On Hiding Access Timings in ORAM

Yuma Kanai,  Kazuki Yoneyama,  

pp.548-551

Publication Date:2018/10/18

Online ISSN:2188-5079

DOI:10.34385/proc.55.We-AM-1-2.1

PDF download

PayPerView

Summary:
Oblivious RAM (ORAM) is a cryptographic primitive for hiding access patterns in cloud environments. Though the ordinary security definition of ORAM guarantees indistinguishability between access sequences of the same length, it cannot be guaranteed for access sequences of different lengths. Hence, ORAM cannot hide access timings or frequency. In this paper, we propose an ORAM scheme that can hide access timings. First, we extend the ordinary security definition. We formulate the hiding property of access timings by defining indistinguishability between access sequences of different lengths. Furthermore, we introduce a new ORAM scheme by adapting the dummy access technique. We prove that our scheme is secure in the proposed definition.