แจ้งเอกสารไม่ครบถ้วน, ไม่ตรงกับชื่อเรื่อง หรือมีข้อผิดพลาดเกี่ยวกับเอกสาร ติดต่อที่นี่ ==>
หากไม่มีอีเมลผู้รับให้กรอก thailis-noc@uni.net.th ติดต่อเจ้าหน้าที่เจ้าของเอกสาร กรณีเอกสารไม่ครบหรือไม่ตรง

Matrix based oblivious random access machine for constrained device

keyword: Oblivious random machine
; Cloud security
; Information security
; Secure access protocol
; Applied cryptography
Abstract: With the internet technological advances of today, cloud computing is used as a shared pool of computer processing and data for computers and other devices. Since a cloud server is semi-trusted, data stored on the server may be secretly investigated for some benefit of the service provider. The cryptography algorithm such as encryption is widely used to ensure the curious server cannot investigate any confidential information of a client. Although the encryption can protect the confidential content from investigating, the curious server still can gain the benefit from other sources of information. Client's behaviour of accessing information is one of the examples which can be investigated. Occasionally, the access pattern or location of data accessed in the storage may leak the information which tells the user's personality. Oblivious Random Access Machine (ORAM) is known as the algorithm used to hide the client’s access pattern from a trusted but curious storage server. Instead of working like a general client-server, ORAM client generates both uploads (write) and download (read) operations whether it wants to download or upload the information. The reason for doing so is to make every access pattern look similar whether upload or download is being performed. In addition, rather than transferring only data of interest, ORAM client transfers group of data in order to hide a data of interest among the other data that are transferred together. According to the processes mentioned earlier, ORAM algorithm incurs of increasing communication overhead, storage overhead, and computation overhead of the system compared to the normal client-server operation. Therefore, the ORAM research focuses on improving the efficiency of the algorithm so that it is able to work as close as the normal system while still maintaining the level of security as the ORAM should be. Each different ORAM type has a different design goal, and the protocol used for accessing the information is slightly different depending on the ORAM data structure. However, the common goal for every ORAM researcher is to create the ORAM which is well functional in the practical solution. Typically, the complexity of the ORAM operation is inversely proportional to the size of space requirement on a client. The ORAM which requires the constant storage space of client (e.g. [1] and [2])needs some extra complex operations to create the security properties, while only few simple operations are enough to a create a secure operation for the ORAM which can provide more extra space on the client (e.g. [3] and [4]). Although an extra space which is required on the client can reduce the complexity of ORAM operation, it does not very beneficial to improve bandwidth consumption spent during the transmission procedure. Since the bandwidth overhead of existing ORAM construction varies according to the ORAM size, bandwidth overhead is another important aspect to be considered besides the operation complexity and storage overhead. In addition, the large storage capacity and high-performance CPUs are generally available at affordable prices. Therefore, the problem of large storage capacity requirement and high complexity of operation is not as important as the use of large amounts of bandwidth for operation. This research focuses on designing ORAM construction which consumes less bandwidth consumption than the other existing schemes while it is still secure under low operation complexity and small storage space usage on the client. To achieve the lower bandwidth consumption than the other ORAM schemes, the new ORAM data structure format should be introduced since the lower bound of bandwidth consumption is based on the ORAM data structure format. In this research, matrix data structure format is used as a basic structure to design the new ORAM construction. It is named as Matrix based ORAM. Matrix based ORAM is a novel ORAM construction that is implemented based on matrix data structure. Two versions of matrix based ORAM will be introduced in this thesis: Matrix ORAM (M-ORAM) and Recursive Matrix ORAM (RM-ORAM). These two constructions are intended for different uses. M-ORAM is used when the system needs to maximise the efficiency of data transmission while RM-ORAM is suggested to be used when the client has very limited storage capacity. M-ORAM is the first matrix based ORAM construction which has bandwidth overhead dependent from the size of ORAM. Rather than depending on the size of ORAM as other existing ORAM schemes ; bandwidth of M-ORAM varies by the height of matrix data structure, thereby allowing M-ORAM to have constant bandwidth cost for any size of ORAM. In addition, M-ORAM uses very simple operation to do an oblivious transfer. It is one of light-weight ORAM schemes that ever have been presented. RM-ORAM, on the other hand, uses slightly complex operations to do the same purpose as M-ORAM. Since RM-ORAM is designed to reduce the use of storage space on the client, it needs some extra operations for transmitting a data to achieve the same security level as M-ORAM. RM-ORAM significantly reduces the client storage usage by using recursion while the computational and bandwidth overhead are slightly increased as a trade-off. However, it can achieve better overall asymptotic performance compared with other existing recursive ORAM schemes. With our two proposed ORAM constructions and their experimental results shown by this thesis, it is evident that the ORAM research has gradually shifted from the theoretical research into practice. It seems likely to be effectively deployed for today's technology.
Thammasat University. Thammasat University Library
Address: BANGKOK
Email: preserv@tu.ac.th
Role: advisor
Role: co-advisor
Created: 2017
Modified: 2021-05-28
Issued: 2021-05-28
วิทยานิพนธ์/Thesis
application/pdf
eng
©copyrights Thammasat University
RightsAccess:
ลำดับที่.ชื่อแฟ้มข้อมูล ขนาดแฟ้มข้อมูลจำนวนเข้าถึง วัน-เวลาเข้าถึงล่าสุด
1 3408karin.pdf 2.57 MB
ใช้เวลา
0.040215 วินาที

Karin Sumongkayothin
Title Contributor Type
Matrix based oblivious random access machine for constrained device
มหาวิทยาลัยธรรมศาสตร์
Karin Sumongkayothin
Komwut Wipusitwarakun
Miyaji, Atsuko
วิทยานิพนธ์/Thesis
Komwut Wipusitwarakun
Title Creator Type and Date Create
The public electronic office for mobile agents and dynamic behavior enhancement of mobile agents through XML-based agent job description
มหาวิทยาลัยธรรมศาสตร์
Komwut Wipusitwarakun
Sutthinant Kaitpraneet
วิทยานิพนธ์/Thesis
Adaptive load balancing based traffic engineering for VoIP application in intra and inter domain IP network
มหาวิทยาลัยธรรมศาสตร์
Komwut Wipusitwarakun;Sawan Runggeratigul
Sanon Chimmanee
วิทยานิพนธ์/Thesis
A multipath routing protocol over chord-based Internet indirection infrastructure (I3)
มหาวิทยาลัยธรรมศาสตร์
Komwut Wipusitwarakun
Banani, Sam
วิทยานิพนธ์/Thesis
User perspective reliability indicator and diversified network allocation for modern virtual service networks
มหาวิทยาลัยธรรมศาสตร์
Komwut Wipusitwarakun
Yee, Thiri The Wut
วิทยานิพนธ์/Thesis
Matrix based oblivious random access machine for constrained device
มหาวิทยาลัยธรรมศาสตร์
Komwut Wipusitwarakun;Miyaji, Atsuko
Karin Sumongkayothin
วิทยานิพนธ์/Thesis
High performance opportunistic routing algorithms for power constrained nodes with message delivery deadline in sparse network environment
มหาวิทยาลัยธรรมศาสตร์
Komwut Wipusitwarakun;Suwan Runggeratigul
Jiradett Kerdsri
วิทยานิพนธ์/Thesis
Adaptive RSS fingerprint estimation algorithm for Wi-Fi based indoor positioning system
มหาวิทยาลัยธรรมศาสตร์
Komwut Wipusitwarakun
Chavalit Koweerawong
วิทยานิพนธ์/Thesis
Mobile sensors' patrol path planning for a border surveillance application
มหาวิทยาลัยธรรมศาสตร์
Komwut Wipusitwarakun
Wichai Pawgasame
วิทยานิพนธ์/Thesis
Push-pull movement algorithm for mobile base station in topology-less wireless cellular networks
มหาวิทยาลัยธรรมศาสตร์
Komwut Wipusitwarakun
Mallika Unhawiwat
วิทยานิพนธ์/Thesis
Miyaji, Atsuko
Title Creator Type and Date Create
Matrix based oblivious random access machine for constrained device
มหาวิทยาลัยธรรมศาสตร์
Komwut Wipusitwarakun;Miyaji, Atsuko
Karin Sumongkayothin
วิทยานิพนธ์/Thesis
Copyright 2000 - 2026 ThaiLIS Digital Collection Working Group. All rights reserved.
ThaiLIS is Thailand Library Integrated System
สนับสนุนโดย สำนักงานบริหารเทคโนโลยีสารสนเทศเพื่อพัฒนาการศึกษา
กระทรวงการอุดมศึกษา วิทยาศาสตร์ วิจัยและนวัตกรรม
328 ถ.ศรีอยุธยา แขวง ทุ่งพญาไท เขต ราชเทวี กรุงเทพ 10400 โทร. โทร. 02-232-4000
กำลัง ออน์ไลน์
ภายในเครือข่าย ThaiLIS จำนวน 19
ภายนอกเครือข่าย ThaiLIS จำนวน 1,705
รวม 1,724 คน

More info..
นอก ThaiLIS = 173,268 ครั้ง
มหาวิทยาลัยราชภัฏ = 883 ครั้ง
มหาวิทยาลัยสังกัดทบวงเดิม = 520 ครั้ง
มหาวิทยาลัยเทคโนโลยีราชมงคล = 202 ครั้ง
มหาวิทยาลัยเอกชน = 40 ครั้ง
สถาบันพระบรมราชชนก = 10 ครั้ง
หน่วยงานอื่น = 9 ครั้ง
มหาวิทยาลัยสงฆ์ = 5 ครั้ง
มหาวิทยาลัยการกีฬาแห่งชาติ = 3 ครั้ง
รวม 174,940 ครั้ง
Database server :
Version 2.5 Last update 1-06-2018
Power By SUSE PHP MySQL IndexData Mambo Bootstrap
มีปัญหาในการใช้งานติดต่อผ่านระบบ UniNetHelp


Server : 8.199.134
Client : Not ThaiLIS Member
From IP : 216.73.216.5