NodeLeaper: Lower Overhead Oblivious AVL Tree

Obliviousness is crypto primitives which intent to hide access pattern. Although ORAM is strongest crypto model, it incurs significant overhead. Elaine Shi et. al. propose Obliviousness Data Structrue (ODS) that makes a great theriotical improvement comparing to general ORAM algorithm, in case of the data blocks exhibit some degree of access predictability. Take AVL tree as an example, when all data blocks are organized as one AVL tree, every nodes (data blocks) contain position information points to both of its child node. As such, the client can immediately obtain the next position to be accessed instead of issuing another ORAM access to the server for a PosMap lookup. Also, the algorithm need extra client space for updating the AVL tree.In this paper, we introduce oblivious AVL tree NodeLeaper, NodeLeaper for short, which enables position information of all child nodes to share part of bits. As such one can store multiple positions for is child and grandson node positions with same block size. In this way, the search can be processed in a leap manner. As a result, NodeLeaper theriotically needs less ORAM accessand client space for node updating than ODS.

[1]  Murat Kantarcioglu,et al.  Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation , 2012, NDSS.

[2]  Kartik Nayak,et al.  Oblivious Data Structures , 2014, IACR Cryptol. ePrint Arch..

[3]  Shweta Shinde,et al.  Preventing Page Faults from Telling Your Secrets , 2016, AsiaCCS.

[4]  Michael T. Goodrich,et al.  Data-Oblivious Graph Drawing Model and Algorithms , 2012, ArXiv.

[5]  Elaine Shi,et al.  ObliviStore: High Performance Oblivious Cloud Storage , 2013, 2013 IEEE Symposium on Security and Privacy.

[6]  Rafail Ostrovsky,et al.  On the (in)security of hash-based oblivious RAM and a new balancing scheme , 2012, SODA.

[7]  Elaine Shi,et al.  Oblivious RAM with O((logN)3) Worst-Case Cost , 2011, ASIACRYPT.

[8]  Ling Ren,et al.  Path ORAM , 2012, J. ACM.

[9]  Amr El Abbadi,et al.  TaoStore: Overcoming Asynchronicity in Oblivious Data Storage , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[10]  Srinivas Devadas,et al.  Suppressing the Oblivious RAM timing channel while making information leakage and program efficiency trade-offs , 2014, 2014 IEEE 20th International Symposium on High Performance Computer Architecture (HPCA).

[11]  Abhi Shelat,et al.  SCORAM: Oblivious RAM for Secure Computation , 2014, IACR Cryptol. ePrint Arch..

[12]  Craig Gentry,et al.  Optimizing ORAM and Using It Efficiently for Secure Computation , 2013, Privacy Enhancing Technologies.

[13]  Srinivas Devadas,et al.  Freecursive ORAM: [Nearly] Free Recursion and Integrity Verification for Position-based Oblivious RAM , 2015 .

[14]  Elaine Shi,et al.  Constants Count: Practical Improvements to Oblivious RAM , 2015, USENIX Security Symposium.

[15]  Rafail Ostrovsky,et al.  Software protection and simulation on oblivious RAMs , 1996, JACM.