ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment

被引:21
|
作者
Huang, Yanyu [1 ]
Li, Bo [1 ]
Liu, Zheli [1 ]
Li, Jin [1 ,2 ]
Yiu, Siu-Ming [3 ]
Baker, Thar [4 ]
Gupta, Brij B. [5 ]
机构
[1] Nankai Univ, Coll Cyber Sci, Nankai 300071, Peoples R China
[2] Guangzhou Univ, Sch Comp Sci, Guangzhou, Peoples R China
[3] Univ Hong Kong, Hong Kong, Peoples R China
[4] Liverpool John Moores Univ, Area Auton Cloud Comp, Liverpool L3 5UG, Merseyside, England
[5] Natl Inst Technol Kurukshetra, Dept Comp Engn, Kurukshetra 136119, Haryana, India
基金
中国国家自然科学基金;
关键词
Cloud computing; Edge computing; Bandwidth; Servers; Encryption; Writing; Time factors; Data privacy; oblivious data access; Internet of Things; fog computing; DATA-STORAGE; INTERNET; THINGS; SECURITY;
D O I
10.1109/TSC.2019.2962110
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Oblivious RAM (ORAM) is important for applications that require hiding of access patterns. However, most of existing implementations of ORAM are very expensive, which are infeasible to be deployed in lightweight devices, like the terminal equipment for Internet of Things (IoT). In this article, we focus on how to apply the expensive ORAM to protect access pattern in IoT devices and propose an ORAM scheme supporting thin-client, called "ThinORAM", under non-colluding clouds. Our proposed scheme removes complicated computations in the client side and requires only O(1) communication cost with a reasonable response time. We further show how to securely deploy ThinORAM in the fog computing environment to achieve oblivious data access with minimum client cost. Experiments show that our scheme can eliminate most of the client storage and reduce the cloud-cloud bandwidth by 2x, with 3x faster response time, when compared to the best scheme that aims at reducing client side overheads.
引用
收藏
页码:602 / 612
页数:11
相关论文
共 50 条
  • [1] Authenticated Key Agreement Scheme for Fog Computing in a Health-Care Environment
    Huang, Yin-Tzu
    Chen, Tzer-Shyong
    Wang, Sheng-De
    IEEE ACCESS, 2023, 11 : 46871 - 46881
  • [2] Insights into security and privacy towards fog computing evolution
    Sicari, Sabrina
    Rizzardi, Alessandra
    Coen-Porisini, Alberto
    COMPUTERS & SECURITY, 2022, 120
  • [3] Towards leakage-resilient fine-grained access control in fog computing
    Yu, Zuoxia
    Au, Man Ho
    Xu, Qiuliang
    Yang, Rupeng
    Han, Jinguang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 763 - 777
  • [4] Fog computing with original data reference function
    Kudo, Tsukasa
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2019, 10 (05) : 574 - 582
  • [5] Towards Practical Oblivious Join Processing
    Chang, Zhao
    Xie, Dong
    Wang, Sheng
    Li, Feifei
    Shen, Yulong
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (04) : 1829 - 1842
  • [6] Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment
    Pallavi, K. N.
    Ravi Kumar, V.
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (04) : 3039 - 3060
  • [7] Fog computing: from architecture to edge computing and big data processing
    Singh, Simar Preet
    Nayyar, Anand
    Kumar, Rajesh
    Sharma, Anju
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (04) : 2070 - 2105
  • [8] Secure Data Query Framework for Cloud and Fog Computing
    Gu, Ke
    Wu, Na
    Yin, Bo
    Jia, Weijia
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (01): : 332 - 345
  • [9] WSN and Fog Computing Integration for Intelligent Data Processing
    Mihai, Viorel
    Hanganu, Cristina Elena
    Stamatescu, Grigore
    Popescu, Dan
    PROCEEDINGS OF THE 2018 10TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI), 2018,
  • [10] Security and privacy issues in fog computing environment
    Lata, Manju
    Kumar, Vikas
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2022, 14 (03) : 289 - 307