TY - GEN
T1 - Design space exploration and optimization of path oblivious RAM in secure processors
AU - Ren, Ling
AU - Yu, Xiangyao
AU - Fletcher, Christopher W.
AU - Van Dijk, Marten
AU - Devadas, Srinivas
PY - 2013
Y1 - 2013
N2 - Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One paradigm to achieve data privacy is to use tamper-resistant processors, inside which users' private data is decrypted and computed upon. These processors need to interact with untrusted external memory. Even if we encrypt all data that leaves the trusted processor, however, the address sequence that goes off-chip may still leak information. To prevent this address leakage, the security community has proposed ORAM (Oblivious RAM). ORAM has mainly been explored in server/file settings which assume a vastly different computation model than secure processors. Not surprisingly, näively applying ORAM to a secure processor setting incurs large performance overheads. In this paper, a recent proposal called Path ORAM is studied. We demonstrate techniques to make Path ORAM practical in a secure processor setting. We introduce background eviction schemes to prevent Path ORAM failure and allow for a performance-driven design space exploration. We propose a concept called super blocks to further improve Path ORAM's performance, and also show an efficient integrity verification scheme for Path ORAM. With our optimizations, Path ORAM overhead drops by 41.8%, and SPEC benchmark execution time improves by 52.4% in relation to a baseline configuration. Our work can be used to improve the security level of previous secure processors.
AB - Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One paradigm to achieve data privacy is to use tamper-resistant processors, inside which users' private data is decrypted and computed upon. These processors need to interact with untrusted external memory. Even if we encrypt all data that leaves the trusted processor, however, the address sequence that goes off-chip may still leak information. To prevent this address leakage, the security community has proposed ORAM (Oblivious RAM). ORAM has mainly been explored in server/file settings which assume a vastly different computation model than secure processors. Not surprisingly, näively applying ORAM to a secure processor setting incurs large performance overheads. In this paper, a recent proposal called Path ORAM is studied. We demonstrate techniques to make Path ORAM practical in a secure processor setting. We introduce background eviction schemes to prevent Path ORAM failure and allow for a performance-driven design space exploration. We propose a concept called super blocks to further improve Path ORAM's performance, and also show an efficient integrity verification scheme for Path ORAM. With our optimizations, Path ORAM overhead drops by 41.8%, and SPEC benchmark execution time improves by 52.4% in relation to a baseline configuration. Our work can be used to improve the security level of previous secure processors.
UR - http://www.scopus.com/inward/record.url?scp=84881169695&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84881169695&partnerID=8YFLogxK
U2 - 10.1145/2485922.2485971
DO - 10.1145/2485922.2485971
M3 - Conference contribution
AN - SCOPUS:84881169695
SN - 9781450320795
T3 - Proceedings - International Symposium on Computer Architecture
SP - 571
EP - 582
BT - ISCA 2013 - 40th Annual International Symposium on Computer Architecture, Conference Proceedings
T2 - 40th Annual International Symposium on Computer Architecture, ISCA 2013
Y2 - 23 June 2013 through 27 June 2013
ER -