首页> 外文学位 >Oblivious Remote Data Access Made Practical.
【24h】

Oblivious Remote Data Access Made Practical.

机译:遗忘的远程数据访问变得切实可行。

获取原文
获取原文并翻译 | 示例

摘要

Access pattern leaks threaten data confidentiality. The ability to access remote information without revealing the objects of interest is thus essential to remote storage privacy. Despite many challenges to deployment, this thesis asserts that there exist practical (applicable and economical) access privacy mechanisms.;Outsourced computing is a popular trend with good reason: significant cost savings can be obtained by consolidating data center management. This trend arrives with a new set of security issues, however. Companies expose themselves to significant risk by placing sensitive data in systems outside their control. Of concern are not only network security, data confidentiality, and collocation issues, but more importantly a significant shift in liability, and a new class of insider attacks.;To defend these new vulnerability surfaces, of special importance becomes the ability to provide clients with practical guarantees of confidentiality and privacy.;This thesis outlines a set of essential outsourcing challenges: (i) How can remotely-hosted data be accessed efficiently with privacy? (ii) How can multiple clients run transactions privately in parallel, with serializability assurances guaranteed by untrusted, possibly malicious transaction managers? (iii) How can new, efficient, minimal-TCB hardware be designed to better provide security and privacy outsourcing guarantees?;To answer these questions, this dissertation introduces new mechanisms for practical private data access and oblivious transaction processing, as well as new trusted hardware designs. A space-time trade-off of client storage vs. efficiency is explored, then expanded to the additional dimensions of multiplicity of clients, the nature of the trusted computing base (hardware vs. software), and the degree of client data processing (access vs. transactions vs. computation). The results are orders of magnitude more efficient than existing work. Together, they bridge the gap between theoretical possibility and practical feasibility.
机译:访问模式泄漏威胁到数据的机密性。因此,在不泄露感兴趣对象的情况下访问远程信息的能力对于远程存储的隐私至关重要。尽管部署面临许多挑战,但本文仍认为存在实用(适用且经济)的访问隐私机制。外包计算是一种流行趋势,其充分理由是:通过整合数据中心管理,可以节省大量成本。但是,这种趋势伴随着一系列新的安全问题。公司通过将敏感数据放置在他们无法控制的系统中,使自己面临重大风险。不仅要关注网络安全性,数据机密性和并置问题,而且更重要的是责任上的重大转变以及新型的内部攻击。要保护这些新的漏洞表面,向客户提供服务的能力就变得尤为重要。本文主要概述了一系列重要的外包挑战:(i)如何利用隐私有效地访问远程托管数据? (ii)多个客户端如何在不信任,可能是恶意的交易管理器保证可串行性的情况下,并行地私下运行交易? (iii)如何设计新的,高效的,最小的TCB硬件,以更好地提供安全性和隐私外包保证?;为回答这些问题,本论文介绍了用于实际私有数据访问和遗忘事务处理的新机制,以及新的可信任机制。硬件设计。探索了客户端存储与效率之间的时空折衷,然后扩展到了客户端多样性,可信计算基础的性质(硬件与软件)以及客户端数据处理的程度(访问权限)的其他维度。与交易与计算之比)。结果比现有工作效率高出几个数量级。它们共同弥补了理论可能性和实际可行性之间的差距。

著录项

  • 作者

    Williams, Peter Thomas.;

  • 作者单位

    State University of New York at Stony Brook.;

  • 授予单位 State University of New York at Stony Brook.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2012
  • 页码 198 p.
  • 总页数 198
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号