Show simple item record

dc.identifier.urihttp://hdl.handle.net/1951/59917
dc.identifier.urihttp://hdl.handle.net/11401/71458
dc.description.sponsorshipThis work is sponsored by the Stony Brook University Graduate School in compliance with the requirements for completion of degree.en_US
dc.formatMonograph
dc.format.mediumElectronic Resourceen_US
dc.language.isoen_US
dc.publisherThe Graduate School, Stony Brook University: Stony Brook, NY.
dc.typeDissertation
dcterms.abstractAccess pattern leaks threaten data confidentiality. The ability to access remote information without revealing the objects of interest is thus essential to remote storage privacy. Despite many challenges to deployment, this thesis asserts that there exist practical (applicable and economical) access privacy mechanisms. Outsourced computing is a popular trend with good reason: significant cost savings can be obtained by consolidating data center management. This trend arrives with a new set of security issues, however. Companies expose themselves to significant risk by placing sensitive data in systems outside their control. Of concern are not only network security, data confidentiality, and collocation issues, but more importantly a significant shift in liability, and a new class of insider attacks. To defend these new vulnerability surfaces, of special importance becomes the ability to provide clients with practical guarantees of confidentiality and privacy. This thesis outlines a set of essential outsourcing challenges: (i) How can remotely-hosted data be accessed efficiently with privacy? (ii) How can multiple clients run transactions privately in parallel, with serializability assurances guaranteed by untrusted, possibly malicious transaction managers? (iii) How can new, efficient, minimal-TCB hardware be designed to better provide security and privacy outsourcing guarantees? To answer these questions, this dissertation introduces new mechanisms for practical private data access and oblivious transaction processing, as well as new trusted hardware designs. A space-time trade-off of client storage vs. efficiency is explored, then expanded to the additional dimensions of multiplicity of clients, the nature of the trusted computing base (hardware vs. software), and the degree of client data processing (access vs. transactions vs. computation). The results are orders of magnitude more efficient than existing work. Together, they bridge the gap between theoretical possibility and practical feasibility.
dcterms.available2013-05-22T17:35:49Z
dcterms.available2015-04-24T14:47:37Z
dcterms.contributorSion, Raduen_US
dcterms.contributorZadok, Erezen_US
dcterms.contributorJohnson, Roben_US
dcterms.contributorPerrig, Adrianen_US
dcterms.contributorYung, Motien_US
dcterms.creatorWilliams, Peter Thomas
dcterms.dateAccepted2013-05-22T17:35:49Z
dcterms.dateAccepted2015-04-24T14:47:37Z
dcterms.dateSubmitted2013-05-22T17:35:49Z
dcterms.dateSubmitted2015-04-24T14:47:37Z
dcterms.descriptionDepartment of Computer Scienceen_US
dcterms.extent198 pg.en_US
dcterms.formatApplication/PDFen_US
dcterms.formatMonograph
dcterms.identifierhttp://hdl.handle.net/1951/59917
dcterms.identifierWilliams_grad.sunysb_0771E_10947en_US
dcterms.identifierhttp://hdl.handle.net/11401/71458
dcterms.issued2012-05-01
dcterms.languageen_US
dcterms.provenanceMade available in DSpace on 2013-05-22T17:35:49Z (GMT). No. of bitstreams: 1 Williams_grad.sunysb_0771E_10947.pdf: 2922780 bytes, checksum: 6e7dfe1803053199d82c7d4c168e94d9 (MD5) Previous issue date: 1en
dcterms.provenanceMade available in DSpace on 2015-04-24T14:47:37Z (GMT). No. of bitstreams: 3 Williams_grad.sunysb_0771E_10947.pdf.jpg: 1894 bytes, checksum: a6009c46e6ec8251b348085684cba80d (MD5) Williams_grad.sunysb_0771E_10947.pdf.txt: 481702 bytes, checksum: 8e40ed22344dfa6ba0a0f9c900aa542b (MD5) Williams_grad.sunysb_0771E_10947.pdf: 2922780 bytes, checksum: 6e7dfe1803053199d82c7d4c168e94d9 (MD5) Previous issue date: 1en
dcterms.publisherThe Graduate School, Stony Brook University: Stony Brook, NY.
dcterms.subjectComputer science
dcterms.subjectAccess Pattern Privacy, Database Outsourcing, Oblivious RAM
dcterms.titleOblivious Remote Data Access Made Practical
dcterms.typeDissertation


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record