亞洲知識產權資訊網為知識產權業界提供一個一站式網上交易平台,協助業界發掘知識產權貿易商機,並與環球知識產權業界建立聯繫。無論你是知識產權擁有者正在出售您的知識產權,或是製造商需要購買技術以提高操作效能,又或是知識產權配套服務供應商,你將會從本網站發掘到有用的知識產權貿易資訊。

First Practical ORAM for Concealing Access Patterns to Data on the Cloud

技術優勢
Solutions to this ORAM problem have existed since 1987, but have not been commercializable due to their enormous internet bandwidth requirements. For example, existing solutions require that the client transfer gigabytes of information to the cloud in order to upload a single megabyte of data. In contrast, the Berkeley approach requires at least 63 times less bandwidth than existing approaches.
技術應用
This Berkeley ORAM software is compatible with popular cloud storage services (i.e Microsot, Amazon, Google, Dropbox, etc), and accordingly it could be positioned as a security feature to enhance existing cloud storage services. Likewise, this software could also be used to enhance security on private networks.
詳細技術說明
None
*Abstract

Many organizations and individuals encrypt data that they store in the cloud to achieve confidentiality and privacy. However, when this data is accessed interactively (such as through a cloud storage service like Dropbox or Skydrive), this encryption isn't enough to ensure privacy. By observing the locations of the accessed data, attackers can often easily recover information about the encrypted data without ever needing to decrypt it.

To address this problem, researchers at UC Berkeley have developed Oblivious RAM (ORAM) software for securely concealing a client's access patterns to data residing in a cloud environment. This enables files to not only be encrypted, but it also prevents attackers (and even the cloud service provide itself) from determining which files (or portions of files) the client is accessing. Furthermore, the Berkeley ORAM software contains techniques for achieving practical performance under realistic scenarios as well as reducing network latency and memory requirements. This development includes a framework that is extensible and readily combined with other algorithms. 

*IP Issue Date
Apr 21, 2015
*Principal Investigation

Name: Elaine Shi

Department:


Name: Emil Stefanov

Department:


Name: Xiaodong Song

Department:

附加資料
Patent Number: US20140007250A1
Application Number: US13919621A
Inventor: Stefanov, Emil | Shi, Elaine | Song, Dawn
Priority Date: 15 Jun 2012
Priority Number: US20140007250A1
Application Date: 17 Jun 2013
Publication Date: 2 Jan 2014
IPC Current: G06F002160
US Class: 726026
Assignee Applicant: The Regents of the University of California
Title: CONCEALING ACCESS PATTERNS TO ELECTRONIC DATA STORAGE FOR PRIVACY
Usefulness: CONCEALING ACCESS PATTERNS TO ELECTRONIC DATA STORAGE FOR PRIVACY
Summary: Method for concealing access patterns to electronic data storage e.g. RAM such as oblivious RAM (O-RAM) and hard disk drives (HDD), (all claimed) used in military equipment, dynamic RAM memory controller, game console such as Xbox (RTM: Video game brand created by Microsoft) and PlayStation (RTM: Video game console created and developed by Sony Computer Entertainment) and smartcard, etc. Can also be used in solid state disk (SSD), other disk and memory in cloud environment.
Novelty: Method for concealing access patterns to electronic data storage e.g. RAM, involves sorting and shuffling subsets of data blocks repeatedly in each electronic data storage partition during data accesses
主要類別
信息和通信技術/電信
細分類別
資訊科技
申請號碼
9015853
其他

Additional Technologies by these Inventors


Tech ID/UC Case

22558/2012-135-0


Related Cases

2012-135-0, 2013-103-1

國家/地區
美國

欲了解更多信息,請點擊 這裡
移動設備