首页 | 本学科首页   官方微博 | 高级检索  
     

不经意随机访问机研究综述
引用本文:吴鹏飞,沈晴霓,秦嘉,钱文君,李聪,吴中海.不经意随机访问机研究综述[J].软件学报,2018,29(9):2753-2777.
作者姓名:吴鹏飞  沈晴霓  秦嘉  钱文君  李聪  吴中海
作者单位:北京大学 软件与微电子学院, 北京 102600;北京大学 软件工程国家工程研究中心, 北京 100871,北京大学 软件与微电子学院, 北京 102600;北京大学 软件工程国家工程研究中心, 北京 100871,北京大学 前沿交叉学科研究院, 北京 100871;北京大学 软件工程国家工程研究中心, 北京 100871,北京大学 软件与微电子学院, 北京 102600;北京大学 软件工程国家工程研究中心, 北京 100871,北京大学 软件与微电子学院, 北京 102600;北京大学 软件工程国家工程研究中心, 北京 100871,北京大学 软件与微电子学院, 北京 102600;北京大学 软件工程国家工程研究中心, 北京 100871
基金项目:国家自然科学基金(61672062,61232005)
摘    要:随着云计算与大数据技术的发展,隐私保护越来越受到人们的关注.加密是一种常见的保护数据隐私的方法,但是单纯地利用加密手段并不能抵抗所有类型的攻击.攻击者可以通过观察用户对数据的访问模式来推断隐私信息,其中包括数据的重要程度、数据的关联性,甚至是加密数据的内容等.不经意随机访问机是一种重要的保护访问模式的手段,它通过混淆每一次访问过程,使其与随机访问不可区分,从而保护真实访问中的访问操作、访问位置等信息.不经意随机访问机在安全云存储系统以及安全计算领域有着非常重要的作用.利用不经意随机访问机可以降低攻击者通过访问模式推测隐私信息的可能性,减小系统受到的攻击面,从而提供更安全更完整的服务.对不经意随机访问机的研究与应用进行综述,主要介绍了不经意随机访问机的相关概念以及设计方法,重点分析并总结了目前学术界研究的性能优化的常见策略及其优劣性,主要包括针对客户端与服务器的平均带宽与最坏情况带宽优化、存储开销优化以及交互轮数优化等方面.同时讨论了将不经意随机访问机应用于安全存储系统的一般性问题,如数据完整性保护以及支持多用户并发访问等,也讨论了将其应用于安全计算领域的问题,如安全计算协议设计以及不经意数据结构的设计等;最后,对不经意随机访问机未来的研究方向进行了展望.

关 键 词:不经意随机访问机  访问模式  隐私保护  安全计算  安全存储
收稿时间:2018/1/3 0:00:00
修稿时间:2018/3/16 0:00:00

Survey of Oblivious RAM
WU Peng-Fei,SHEN Qing-Ni,QIN Ji,QIAN Wen-Jun,LI Cong and WU Zhong-Hai.Survey of Oblivious RAM[J].Journal of Software,2018,29(9):2753-2777.
Authors:WU Peng-Fei  SHEN Qing-Ni  QIN Ji  QIAN Wen-Jun  LI Cong and WU Zhong-Hai
Affiliation:School of Software and Microelectronics, Peking University, Beijing 102600, China;National Engineering Research Center for Software Engineering, Peking University, Beijing 100871, China,School of Software and Microelectronics, Peking University, Beijing 102600, China;National Engineering Research Center for Software Engineering, Peking University, Beijing 100871, China,Academy for Advanced Interdisciplinary Studies, Peking University, Beijing 100871, China;National Engineering Research Center for Software Engineering, Peking University, Beijing 100871, China,School of Software and Microelectronics, Peking University, Beijing 102600, China;National Engineering Research Center for Software Engineering, Peking University, Beijing 100871, China,School of Software and Microelectronics, Peking University, Beijing 102600, China;National Engineering Research Center for Software Engineering, Peking University, Beijing 100871, China and School of Software and Microelectronics, Peking University, Beijing 102600, China;National Engineering Research Center for Software Engineering, Peking University, Beijing 100871, China
Abstract:With the development of cloud computing and big data technology, privacy protection draws more people''s attention. Data encryption is a common way to protect data privacy, but solely using encryption cannot resist all types of attacks. Adversary can observe the access pattern on how users access to the data, to infer the private information including the importance of the data, the relevance between the data and even the plaintext of encrypted data. Oblivious RAM (ORAM) is an important method to protect the access pattern, including access operations and access locations, by obscuring an actual access, which makes adversary unable to distinguish it from a random one. ORAM makes an important role in designing secure cloud storage systems and secure computation. ORAM can reduce the possibility of the adversary inferring the private information through the access pattern and reduce the attack surface of the system, so as to provide a safer and more complete service. This paper summarizes the researches and application settings of the ORAM, mainly introducing the relevant concepts of the model as well as design methods with focus placed on analyzing and summarizing common strategies to optimize the model and their advantages and disadvantages, as well as optimizations for amortized and worst-case bandwidth between client and server, storage overheads reduction and round-trips reduction. Moreover, this paper discusses general issues of the ORAM used for secure storage system designing including data integrity and concurrent accesses for multi-clients. The paper also discusses some issues of the ORAM used for secure computation, including secure computation protocols designing and oblivious data structure designing, and finally makes a conclusion for the future research directions of the ORAM.
Keywords:oblivious RAM  access pattern  privacy protection  secure computation  secure storage
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号