亚洲知识产权资讯网为知识产权业界提供一个一站式网上交易平台,协助业界发掘知识产权贸易商机,并与环球知识产权业界建立联系。无论你是知识产权拥有者正在出售您的知识产权,或是制造商需要购买技术以提高操作效能,又或是知识产权配套服务供应商,你将会从本网站发掘到有用的知识产权贸易资讯。

First Practical ORAM for Concealing Access Patterns to Data on the Cloud

技术优势
Solutions to this ORAM problem have existed since 1987, but have not been commercializable due to their enormous internet bandwidth requirements. For example, existing solutions require that the client transfer gigabytes of information to the cloud in order to upload a single megabyte of data. In contrast, the Berkeley approach requires at least 63 times less bandwidth than existing approaches.
技术应用
This Berkeley ORAM software is compatible with popular cloud storage services (i.e Microsot, Amazon, Google, Dropbox, etc), and accordingly it could be positioned as a security feature to enhance existing cloud storage services. Likewise, this software could also be used to enhance security on private networks.
详细技术说明
None
*Abstract

Many organizations and individuals encrypt data that they store in the cloud to achieve confidentiality and privacy. However, when this data is accessed interactively (such as through a cloud storage service like Dropbox or Skydrive), this encryption isn't enough to ensure privacy. By observing the locations of the accessed data, attackers can often easily recover information about the encrypted data without ever needing to decrypt it.

To address this problem, researchers at UC Berkeley have developed Oblivious RAM (ORAM) software for securely concealing a client's access patterns to data residing in a cloud environment. This enables files to not only be encrypted, but it also prevents attackers (and even the cloud service provide itself) from determining which files (or portions of files) the client is accessing. Furthermore, the Berkeley ORAM software contains techniques for achieving practical performance under realistic scenarios as well as reducing network latency and memory requirements. This development includes a framework that is extensible and readily combined with other algorithms. 

*IP Issue Date
Apr 21, 2015
*Principal Investigation

Name: Elaine Shi

Department:


Name: Emil Stefanov

Department:


Name: Xiaodong Song

Department:

附加资料
Patent Number: US20140007250A1
Application Number: US13919621A
Inventor: Stefanov, Emil | Shi, Elaine | Song, Dawn
Priority Date: 15 Jun 2012
Priority Number: US20140007250A1
Application Date: 17 Jun 2013
Publication Date: 2 Jan 2014
IPC Current: G06F002160
US Class: 726026
Assignee Applicant: The Regents of the University of California
Title: CONCEALING ACCESS PATTERNS TO ELECTRONIC DATA STORAGE FOR PRIVACY
Usefulness: CONCEALING ACCESS PATTERNS TO ELECTRONIC DATA STORAGE FOR PRIVACY
Summary: Method for concealing access patterns to electronic data storage e.g. RAM such as oblivious RAM (O-RAM) and hard disk drives (HDD), (all claimed) used in military equipment, dynamic RAM memory controller, game console such as Xbox (RTM: Video game brand created by Microsoft) and PlayStation (RTM: Video game console created and developed by Sony Computer Entertainment) and smartcard, etc. Can also be used in solid state disk (SSD), other disk and memory in cloud environment.
Novelty: Method for concealing access patterns to electronic data storage e.g. RAM, involves sorting and shuffling subsets of data blocks repeatedly in each electronic data storage partition during data accesses
主要类别
信息和通信技术/电信
细分类别
资讯科技
申请号码
9015853
其他

Additional Technologies by these Inventors


Tech ID/UC Case

22558/2012-135-0


Related Cases

2012-135-0, 2013-103-1

国家/地区
美国

欲了解更多信息,请点击 这里
移动设备