Technology
Oblivious RAM (ORAM) software prevents attackers from determining which files (or portions of files) the client is accessing by concealing a client's access patterns to data residing in a cloud environment.
Elements & claims
1. A method of concealing access patterns to electronic data storage, the method comprising:
(a) within at least one server device configured for providing data storage services to at least one client, securely partitioning electronic data storage having N data blocks, each data block having a size of B bytes;
(b) wherein said electronic data storage is partitioned within a partitioning framework into a plurality of P smaller electronic data storage partitions having a size of N/P, and in which P is equal to √N data blocks;
(c) performing electronic data storage access concealment, in which each block is randomly assigned to any of the P partitions, and whenever a data block is accessed during data accesses for reading a data block or writing a data block by the client, the data block is logically removed from its current partition and logically assigned to a fresh random partition selected from all P partitions, with the client tracking which partition each block is associated with at any point of time; and (d) encrypting data by the client when data blocks are stored on the server; (e) wherein the client repeatedly sorts and shuffles subsets of said data blocks in each partition during data accesses.
21. A system for concealing access patterns to electronic data storage, the system comprising:
(a) at least one server configured for servicing at least one client with data storage services;
(b) at least one client configured for accessing said server for performing write and read accesses of data blocks from said server;
(c) wherein said server and said client are configured with a computer for executing programming for carrying out steps of access concealment, comprising:
(i) securely partitioning electronic data storage in said at least one server to have N data blocks having a size of B bytes;
(ii) wherein said electronic data storage is partitioned within a partitioning framework into a plurality of P smaller electronic data storage partitions having a size of N/P, and in which P is equal to equal to √N data blocks;
(iii) performing electronic data storage access concealment, in which each block is randomly assigned to any of the P partitions, and whenever a data block is accessed during data accesses for reading a data block or writing a data block by said client, the data block is logically removed from its current partition and logically assigned to a fresh random partition selected from all P partitions, with the client tracking which partition each block is associated with at any point of time; and
(iv) encrypting data by the client when data blocks are stored on the server;
(v) wherein the client repeatedly sorts and shuffles subsets of said data blocks in each partition during data accesses
Venture Dojo feedback
The website structure is pretty clear and easy to follow as it divides to course lists and user profile, thus users can easily get access to courses they register and track their progress as fast as possible.
The course search bar on top of the course page is slightly too wide which can block part of the video and affect the viewing experience.
Home page's design is decent and clean.
The videos can't load successfully.
Hi Julie,
ReplyDeleteYou're up to speed. It was helpful for me to have the highlights in the description. Seems Tal is teaching well.
Appreciate the feedback on VentureDojo. Anything that doesn't work is best to know so we can fix it. Apply the same principles when reviewing other blogs in the class. Constructive criticism... !
Look forward to seeing your pre-pitch on Thurs.
- RR