Multi-cloud oblivious storage

  title={Multi-cloud oblivious storage},
  author={Emil Stefanov and Elaine Shi},
  booktitle={ACM Conference on Computer and Communications Security},
We present a 2-cloud oblivious storage (ORAM) system that achieves 2.6X bandwidth cost between the client and the cloud. Splitting an ORAM across 2 or more non-colluding clouds allows us to reduce the client-cloud bandwidth cost by at least one order of magnitude, shifting the higher-bandwidth communication to in-between the clouds where bandwidth provisioning is abundant. Our approach makes ORAM practical for bandwidth-constrained clients such as home or mobile Internet connections. We provide… CONTINUE READING
Highly Influential
This paper has highly influenced 16 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 97 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 67 extracted citations

CHf-ORAM : A Constant Communication ORAM without Homomorphic Encryption

Tarik Moataz, Erik - Oliver Blass Airbus Group Innovations
View 8 Excerpts
Highly Influenced

Write-only oblivious RAM-based privacy-preserved access of outsourced data

International Journal of Information Security • 2013
View 10 Excerpts
Highly Influenced

Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving

IEEE Transactions on Information Forensics and Security • 2017
View 5 Excerpts
Highly Influenced

MSKT-ORAM: A Constant Bandwidth ORAM without Homomorphic Encryption

IACR Cryptology ePrint Archive • 2016
View 4 Excerpts
Highly Influenced

ZeroDB white paper

View 9 Excerpts
Highly Influenced

98 Citations

Citations per Year
Semantic Scholar estimates that this publication has 98 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-7 of 7 references

PrivateFS: a parallel oblivious file system

ACM Conference on Computer and Communications Security • 2012
View 11 Excerpts
Highly Influenced

Shroud: Enabling private access to large-scale data in the data center

J. R. Lorch, J. W. Mickens, B. Parno, M. Raykova, J. Schiffman
In FAST, • 2013
View 7 Excerpts
Highly Influenced

Building castles out of mud: practical access pattern privacy and correctness on untrusted storage

ACM Conference on Computer and Communications Security • 2008
View 5 Excerpts
Highly Influenced

Usable PIR

View 6 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…