Computer Science – Data Structures and Algorithms
Scientific paper
2010-07-07
Computer Science
Data Structures and Algorithms
A more complete version of a paper appearing in the 38th International Colloquium on Automata, Languages and Programming (ICAL
Scientific paper
Suppose a client, Alice, has outsourced her data to an external storage provider, Bob, because he has capacity for her massive data set, of size n, whereas her private storage is much smaller--say, of size O(n^{1/r}), for some constant r > 1. Alice trusts Bob to maintain her data, but she would like to keep its contents private. She can encrypt her data, of course, but she also wishes to keep her access patterns hidden from Bob as well. We describe schemes for the oblivious RAM simulation problem with a small logarithmic or polylogarithmic amortized increase in access times, with a very high probability of success, while keeping the external storage to be of size O(n). To achieve this, our algorithmic contributions include a parallel MapReduce cuckoo-hashing algorithm and an external-memory dataoblivious sorting algorithm.
Goodrich Michael T.
Mitzenmacher Michael
No associations
LandOfFree
Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-102040