Table 1: The evaluation results on the average min-entropy and the amount of information leakage for the fastest ORAMs
with secure buffers of different sizes N
S
= 8, 16,32,64,128,256, 512.
Size of secure buffer 8 16 32 64 128 256 512
Average min-entropy 24564 25032 26391 27319 27981 28224 28246
Amount of information leakage 10467 9998.5 8639.5 7712.1 7049.6 6806.6 6784.6
7 CONCLUSION
We proposed an evaluation framework for the fastest
Oblivious RAM (ORAM) . While the computational
overhead is dramatically improved by avoiding re-
peated shuffles of data blocks in a memory, the secu-
rity of the fastest ORAM has not been analyzed suffi-
ciently. We thus formulated a new security definition
for ORAM constructions involving information leak-
age on the basis of the average min-entropy, namely,
l-leakage access pattern hiding. We also provided a
lower bound using the collision entropy for the av-
erage min-entropy. Then, for the fastest ORAM we
introduced a practical way to evaluate the amount of
information leakage from the probability distribution
of distance between memory access patterns. Finally,
we applied the fastest ORAM to a program of AES,
and evaluated the actual amount of information leak-
age in the fastest ORAM. As a result, we confirmed
that by optimizing the size of a secure buffer used for
the fastest ORAM, it can achieve l-leakage access pat-
tern hiding for a required security level l. In the fu-
ture, we will evaluate the amount of the leakage when
the fastest ORAM is applied to other types of pro-
grams for validating the usefulness of our proposed
framework.
REFERENCES
Dodis, Y., Ostrovsky, R., Reyzin, L., and Smith, A. (2008).
Fuzzy extractors: How to generate strong keys from
biometrics and other noisy data. SIAM Journal of
Computing, 38(1):97–139.
Fehr, S. and Berens, S. (2014). On the conditional r
´
enyi
entropy. IEEE Transactions on Information Theory,
60(11):6801–6810.
Goldreich, O. (1987). Towards a theory of software protec-
tion and simulation by oblivious rams. In Proceedings
of the 19th annual ACM symposium on Theory of com-
puting (STOC 1987), pages 182–194.
Goldreich, O. and Ostrovsky, R. (2007). Software protec-
tion and simulation on oblivious rams. Journal of the
ACM (JACM), 19(6–8):241–254.
Goodrich, M. T. and Mitzenmacher, M. (2011). Privacy-
preserving access of outsourced data via oblivious ram
simulation. In Proceedings of the 38th International
Colloquium on Automata, Languages and Program-
ming (ICALP 2011), pages 576–587.
Goodrich, M. T., Mitzenmacher, M., Ohrimenko, O., and
Tamassia, R. (2011). Oblivious ram simulation with
efficient worstcase access overhead. In Proceedings
of the 3rd ACM Cloud Computing Security Workshop
(CCSW 2011), pages 95–100.
Goodrich, M. T., Mitzenmacher, M., Ohrimenko, O., and
Tamassia, R. (2012). Practical oblivious storage. In
Proceedings of the second ACM conference on Data
and Application Security and Privacy (CODASPY
2012), pages 13–24.
Hidano, S., Ohki, T., Komatsu, N., and i, K. T. (2010).
A metric of identification performance of biomet-
rics based on information content. In Proceedings
of the 11th International Conference on Control, Au-
tomation, Robotics and Vision (ICARCV 2010), pages
1274–1279.
Hidano, S., Ohki, T., and Takahashi, K. (2012). Evaluation
of security for biometric guessing attacks in biomet-
ric cryptosystem using fuzzy commitment scheme.
In Proceedings of 2012 International Conference of
the Biometrics Special Interest Group (BIOSIG 2012),
pages 1–6.
Kokonendji, C. C., Kiesse, T. S., and Zocchi, S. S. (2007).
Discrete triangular distributions and non-parametric
estimation for probability mass function. Journal of
Nonparametric Statistics, 43(3):431–473.
Kushilevitz, E., Lu, S., and Ostrovsky, R. (2012). On the
(in)security of hash-based oblivious ram and a new
balancing scheme. In Proceedings of the 23rd ACM-
SIAM Symposium on Discrete Algorithms (SODA
2012), pages 143–156.
Nakano, Y., Cid, C., Kiyomoto, S., and Miyake, Y.
(2012). Memory access pattern protection for
resource-constrained devices. In Proceedings of the
11th international conference on Smart Card Re-
search and Advanced Applications (CARDIS 2012),
pages 188–202.
Pinkas, B. and Reinman, T. (2010). Oblivious ram revis-
ited. In Proceedings of the 30th Annual Cryptology
Conference (CRYPTO 2010), pages 512–519.
Renyi, A. (1960). On measures of entropy and informa-
tion. In Proceedings of the 4th Berkeley Symposium on
Mathematical Statistics and Probability, pages 547–
561.
Shi, E., Chan, T. H., Stefanov, E., and Li, M. (2011). Obliv-
ious ram with o((logn)
3
) worst-case cost. In Proceed-
ings the 17th International Conference on the Theory
and Application of Cryptology and Information Secu-
rity (ASIACRYPT 2011), pages 197–214.
An Evaluation Framework for Fastest Oblivious RAM
121