Global Information Lookup Global Information

Oblivious data structure information


In computer science, an oblivious data structure is a data structure that gives no information about the sequence or pattern of the operations that have been applied except for the final result of the operations.[1]

In most conditions, even if the data is encrypted, the access pattern can be achieved, and this pattern can leak some important information such as encryption keys. And in the outsourcing of cloud data, this leakage of access pattern is still very serious. An access pattern is a specification of an access mode for every attribute of a relation schema. For example, the sequences of user read or write the data in the cloud are access patterns.

We say a machine is oblivious if the sequence in which it accesses is equivalent for any two inputs with the same running time. So the data access pattern is independent from the input.

Applications:

  • Cloud data outsourcing: When writing or reading data from a cloud server, oblivious data structures are useful. And modern databases rely on data structures heavily, so oblivious data structures come in handy.
  • Secure processor: Tamper-resilient secure processors are used for defense against physical attacks or the malicious intruders access the users’ computer platforms. The existing secure processors designed in academia and industry include AEGIS and Intel SGX. But the memory addresses are still transferred in the clear on the memory bus. So the research finds that this memory buses can give out the information about encryption keys. With the Oblivious data structure comes in practical, the secure processor can obfuscate memory access pattern in a provably secure manner.
  • Secure computation: Traditionally people used circuit-model to do the secure computation, but the model is not enough for the security when the amount of data is getting big. RAM-model secure computation was proposed as an alternative to the traditional circuit model, and oblivious data structure is used to prevent information access behavioral being stolen.
  1. ^ Cite error: The named reference Wang was invoked but never defined (see the help page).

and 19 Related for: Oblivious data structure information

Request time (Page generated in 0.8128 seconds.)

Oblivious data structure

Last Update:

In computer science, an oblivious data structure is a data structure that gives no information about the sequence or pattern of the operations that have...

Word Count : 1344

Oblivious RAM

Last Update:

Machinery, pp. 357–368, doi:10.1145/2840728.2840761, ISBN 978-1-4503-4057-1, MR 3629839, S2CID 9729386 Oblivious data structure Cache-oblivious algorithm...

Word Count : 3993

Domain Name System

Last Update:

It defines the DNS protocol, a detailed specification of the data structures and data communication exchanges used in the DNS, as part of the Internet...

Word Count : 9105

Confidential computing

Last Update:

Systems, Enclaive, Fortanix, IBM Hyper Protect Services, Mithril Security, Oblivious, Opaque Systems, Scontain, Secretarium and others. Confidential computing...

Word Count : 4300

TokuDB

Last Update:

Retrieved 2011-01-17. "Cache Oblivious B-trees". State University of New York (SUNY) at Stony Brook. Retrieved 2011-01-17. "Big Data is Creating The Future...

Word Count : 540

Matrix multiplication algorithm

Last Update:

version, but unlike that algorithm, the recursive algorithm is cache-oblivious: there is no tuning parameter required to get optimal cache performance...

Word Count : 4327

Fault tolerance

Last Update:

rather than the three of TMR, but has been used commercially. Failure-oblivious computing is a technique that enables computer programs to continue executing...

Word Count : 5006

Locality of reference

Last Update:

adjacent data structures with identical structure and size, accessing mutually corresponding elements of each structure rather than each entire structure. This...

Word Count : 2326

Cache replacement policies

Last Update:

hardware-maintained structure can utilize to manage a cache of information. Caching improves performance by keeping recent or often-used data items in memory...

Word Count : 5238

External memory algorithm

Last Update:

Demaine, Erik (2002). Cache-Oblivious Algorithms and Data Structures (PDF). Lecture Notes from the EEF Summer School on Massive Data Sets. Aarhus: BRICS. NASA...

Word Count : 1031

Machine learning

Last Update:

picture, and they learn relationships between pixels that humans are oblivious to, but that still correlate with images of certain types of real objects...

Word Count : 14304

Fast Fourier transform

Last Update:

along the n1 direction. More generally, an asymptotically optimal cache-oblivious algorithm consists of recursively dividing the dimensions into two groups...

Word Count : 7355

Turing machine equivalents

Last Update:

steps can be performed by an oblivious two-tape Turing machine in O(nlog⁡n){\displaystyle O(n\log n)} steps. Oblivious machines correspond in a step-wise...

Word Count : 2662

Cryptographic hash function

Last Update:

Naor, Moni; Reingold, Omer; Rosen, Alon (2005). "On Robust Combiners for Oblivious Transfer and Other Primitives". Advances in Cryptology – EUROCRYPT 2005...

Word Count : 6067

Market profile

Last Update:

likely meaningless or misleading. Most traders who use Profiles seem oblivious to the requirement for normality. 2. Even in overall equilibrium markets...

Word Count : 1745

The Gherkin

Last Update:

the idea was that the passer-by in neighbouring streets would be nearly oblivious to the tower's existence until directly underneath it.[citation needed]...

Word Count : 2747

Bakugan season 1

Last Update:

subjected to. She's doesn't want to tell him because her parents are oblivious to the fact that she's a Brawler. Juno then proceeds to hack into Mia's...

Word Count : 125

External sorting

Last Update:

memory transfers between internal and external memory. Like their cache-oblivious counterparts, asymptotically optimal external sorting algorithms achieve...

Word Count : 2149

Chernobyl disaster

Last Update:

morning, at 01:23 local time, went about their usual business, completely oblivious to what had just happened. However, within a few hours of the explosion...

Word Count : 29485

PDF Search Engine © AllGlobal.net