Encrypted Search Cloud Service with Cryptographic Sharing

ABSTRACT

A method for sharing read access to a document stored on memory hardware. The method includes receiving a shared read access command from a sharor sharing read access to a sharee for a document stored on memory hardware in communication with the data processing hardware, and receiving a shared read access request from the sharee. The shared read access command includes an encrypted value and a first cryptographic share value based on a write key, a read key, a document identifier, and a sharee identifier. The method also includes multiplying the first and second cryptographic share values to determine a cryptographic read access value. The cryptographic read access value authorizes read access to the sharee for the document. The method also includes storing a read access token for the sharee including the cryptographic read access value and the encrypted value in a user read set of the memory hardware.

CROSS REFERENCE TO RELATED APPLICATIONS

This U.S. patent application is a continuation of, and claims priorityunder 35 U.S.C. § 120 from, U.S. patent application Ser. No. 17/446,456,filed on Aug. 30, 2021, which is a continuation of U.S. patentapplication Ser. No. 16/781,169, filed on Feb. 4, 2020, now U.S. Pat.No. 11,126,742, which is a continuation of U.S. patent application Ser.No. 15/878,871, filed on Jan. 24, 2018, now U.S. Pat. No. 10,592,685,which claims priority under 35 U.S.C. § 119(e) to: U.S. ProvisionalApplication No. 62/490,804, filed on Apr. 27, 2017; U.S. ProvisionalApplication No. 62/508,374, filed on May 18, 2017; U.S. ProvisionalApplication No. 62/508,523, filed on May 19, 2017; and U.S. ProvisionalApplication No. 62/597,781, filed on Dec. 12, 2017. The disclosures ofthese prior applications are considered part of the disclosure of thisapplication and are hereby incorporated by reference in theirentireties.

TECHNICAL FIELD

This disclosure relates to providing search functionality withcryptographic sharing over encrypted items stored on a distributedsystem.

BACKGROUND

Enterprises and individual users are using distributed storage systems(i.e., cloud storage services) to store data on memory overlyingmultiple memory locations. Many of these enterprises and individualsencrypt their data before uploading the data onto the distributedstorage system. In order to use essential functionalities offered by thecloud storage services, such as performing search queries on storeddata, enterprises are required to provide plaintext access to the cloudstorage services. As a result, some government and sensitive privatesectors, such as health, finance, and legal may be reluctant to usecloud storage services, despite their increased convenience and costadvantages. Additionally, encryption alone may not suffice for ensuringdata privacy, as the mere knowledge of data access patterns can providea significant amount of information about the data without ever needingto decrypt the data.

SUMMARY

SECTION A: Encrypted Search Cloud Service with Cryptographic Sharing

One aspect of the disclosure provides a method for sharing read access.The method includes receiving, at data processing hardware, a sharedread access command from a sharor sharing read access to a sharee for adocument stored on memory hardware in communication with the dataprocessing hardware. The shared read access command includes anencrypted value and a first cryptographic share value based on a writekey for the document, a read key for the document, a document identifieridentifying the document, and a sharee identifier identifying thesharee. The method also includes receiving, at the data processinghardware, a shared read access request from the sharee and multiplying,by the data processing hardware, the first cryptographic share value andthe second cryptographic share value to determine a cryptographic readaccess value. The shared read access request includes the shareeidentifier, the document identifier, and a second cryptographic sharevalue based on the read key for the document and a sharee cryptographickey associated with the sharee. The cryptographic read access valueauthorizes read access to the sharee for the document. The methodfurther includes storing, by the data processing hardware, a read accesstoken for the sharee including the cryptographic read access value andthe encrypted value in a user read set of the memory hardware. The userread set includes a list of sharee identifiers associated with shareeshaving read access to the document.

Implementations of the disclosure may include one or more of thefollowing optional features. In some implementations, the sharor isconfigured to: send the read key for the document to the sharee over asecure and authenticated communication link; create metadata for thedocument; compute the encrypted value by encrypting the metadata for thedocument using the read key; and send the shared read access command tothe data processing hardware. The first cryptographic share value may becalculated based on a function of the write key and the documentidentifier divided by a function of the read key and the shareeidentifier. The second cryptographic share value may be calculated basedon a function of the read key and the sharee identifier divided by afunction of the sharee cryptographic key and the document identifier.

In some examples, the method includes receiving, at the data processinghardware, a revoke read access command from the sharor revoking readaccess from the sharee for the document stored on the memory hardwareand removing, by the data processing hardware, the read access token forthe sharee from the user read set. In response to receiving the revokeread access command, the method may include determining, by the dataprocessing hardware, whether a corresponding write access token existsfor the sharee in a user write set of the memory hardware. When thecorresponding write access token exists, the method may includeremoving, by the data processing hardware, the write access token fromthe memory hardware.

After storing the read access token for the sharee, the method mayinclude receiving, at the data processing hardware, a search query for akeyword in the document from the sharee. The search query may includethe sharee identifier, the document identifier and a cryptographicsearch value based on the read key for the document, the keyword, andthe sharee cryptographic key associated with the sharee. The method mayalso include retrieving, by the data processing hardware, the readaccess token for the sharee from the user read set of the memoryhardware and computing, by the data processing hardware, a cryptographicword set token based on the received cryptographic search value and theretrieved read access token for the sharee. The method may furtherinclude determining, by the data processing hardware, whether thecomputed cryptographic word set token matches a correspondingcryptographic word set token of a word set stored in the memoryhardware. When the computed cryptographic word set token matches thecorresponding cryptographic word set token of the word set, the methodmay include retrieving, by the data processing hardware, encrypted wordmetadata of the document associated with the keyword from the memoryhardware and sending, by the data processing hardware, a search resultset to the sharee. The query response may include the encrypted documentmetadata and the encrypted word metadata. The sharee may be configuredto decrypt the encrypted document metadata using the read key anddecrypt the encrypted word metadata using the read key.

In some implementations, the method includes receiving, at the dataprocessing hardware, a write access token from the sharee based on thewrite key for the document, the document identifier, the shareeidentifier and the sharee cryptographic key. The method may also includestoring, by the data processing hardware, the write access token in auser write set of the memory hardware, the user write set including alist of sharee identifiers associated with sharees having write accessto the document. The sharee may be configured to receive the write keyfor the document from the sharor over a secure and authenticatedcommunication link. The method may further include receiving, at thedata processing hardware, a revoke write access command from the sharorrevoking write access from the sharee for the document stored on thememory hardware and removing, by the data processing hardware, the writeaccess token for the sharee from the user write set.

Another aspect of the disclosure provides a second method for sharingwrite access. The method includes receiving, at a sharee deviceassociated with a sharee, shared write access permissions from a sharorsharing write access to the sharee for a document stored on adistributed storage system. The shared write access permissions includea read key for the document, a write key for the document and encryptedmetadata for the document. The method also includes determining, at thesharee device, a cryptographic write access value based on the write keyfor the document, a document identifier identifying the document, asharee identifier identifying the sharee, and a sharee cryptographic keyassociated with the sharee. The cryptographic write access valueauthorizes write access to the sharee for the document. The methodfurther includes sending a write access token for the sharee from thesharee device to the distributed storage system. The write access tokenincluding the cryptographic write access value. In response to receivingthe write access token, the distributed storage system is configured tostore the write access token in a user write set. The user write setincludes a list of sharee identifiers associated with sharees havingwrite access to the document.

Implementations of the disclosure may include one or more of thefollowing optional features. In some implementations, the sharor may beconfigured to revoke write access from the sharee for the documentstored on the distributed storage system (e.g., after sending the writeaccess token for the sharee) by sending a revoke write access command tothe distributed storage system. In response to receiving the revokewrite access command, the distributed storage system is configured toremove the write access token for the sharee from the user write set.The method may also include determining, at the sharee device, acryptographic read access value based on the write key for the document,the document identifier, and the sharee cryptographic key. Thecryptographic read access value may authorize read access to the shareefor the document. Sending a read access token for the sharee may includethe cryptographic read access value and the encrypted metadata for thedocument to the distributed storage system. The distributed storagesystem in response to receiving the read access token, may be configuredto store the read access token in a user read set. The user read set mayinclude a list of sharee identifiers associated with sharees having readaccess to the document.

The sharor may be configured to revoke read access from the sharee forthe document stored on the distributed storage system (e.g., aftersending the read access token for the sharee) by sending a revoke readaccess command to the distributed storage system. In response toreceiving the revoke read access command, the distributed storage systemmay be configured to remove the write access token for the sharee fromthe user write set and remove the read access token for the sharee fromthe user read set. The sharor may be configured to, prior to receivingthe shared write access permissions from the sharor: create the metadatafor the document; encrypt the metadata for the document using the readkey; and send the shared write access permissions to the sharee over asecure and authenticated communication link. Receiving the shared writeaccess permissions from the sharor may include receiving the sharedwrite access permissions from the sharor over a secure and authenticatedcommunication link.

After sending the write access token for the sharee to the distributedstorage system, the method may include creating, by the user device,word metadata for the document associated with a word in the document tobe edited and encrypting, by the user device, the word metadata usingthe read key for the document. The method may also include computing, bythe user device, a cryptographic edit value based on the read key forthe document, a word identifier associated with the word in the documentto be edited, the sharee cryptographic key associated with the sharee,the sharee identifier and the write key for the document. The method mayfurther include sending an edit operation request including thecryptographic edit value, the sharee identifier, the documentidentifier, and the encrypted word metadata to the distributed storagesystem. The edit operation request may request the distributed storagesystem to process an edit operation on the word in the document to beedited.

In response to receiving the edit operation request from the userdevice, the distributed storage system may be configured to retrieve thewrite access token from the user write set and compute a cryptographicword set token based on the cryptographic edit value and the retrievedwrite access token for the sharee. When the edit operation requested bythe edit operation request includes a delete operation, the distributedstorage system may process the delete operation by removing acorresponding cryptographic word set token of a word set stored by thedistributed storage system.

In response to receiving the edit operation request, the distributedstorage system may be configured to retrieve the write access token fromthe user write set and compute a cryptographic word set token based onthe cryptographic edit value and the retrieved write access token forthe sharee. When the edit operation requested by the edit operationrequest includes an overwrite operation, the distributed storage systemmay process the overwrite operation by overwriting a correspondingcryptographic word set token of a word set stored by the distributedstorage system with the computed cryptographic word set token and theencrypted word metadata.

In response to receiving the edit operation request from the userdevice, the distributed storage system may be configured to retrieve thewrite access token from the user write set and compute a cryptographicword set token based on the cryptographic edit value and the retrievedwrite access token for the sharee. When the edit operation requested bythe edit operation request includes an add operation, the distributedstorage system may process the add operation by adding the computedcryptographic word set token and the encrypted word metadata to a wordset stored by the distributed storage system.

Yet another aspect of the disclosure provides a system for sharing readaccess to a document. The system includes a sharor device, a shareedevice, data processing hardware of the storage system in communicationwith the sharor device and the sharee device, and memory hardware incommunication with the data processing hardware. The sharor device isconfigured to create metadata for a document on stored on a storagesystem and encrypts the metadata using a read key for the document andcalculate a first cryptographic share value for the document. The firstcryptographic share value is based on a write key for the document, aread key for the document, a document identifier identifying thedocument, and a sharee identifier identifying a sharee to receive sharedread access to the document. The sharee device is associated with thesharee and is configured to receive the read key for the document fromthe sharor device over a secure and authenticated communication channeland calculate a second cryptographic share value for the document. Thesecond cryptographic share value may be based on the read key for thedocument and a sharee cryptographic key associated with the sharee. Thememory hardware stores instructions that when executed on the dataprocessing hardware cause the data processing hardware to performoperations. The operations include receiving a shared read accesscommand from the sharor device sharing read access to the sharee. Theshared read access command includes the encrypted metadata for thedocument and the first cryptographic share value. The operations alsoinclude receiving a shared read access request from the sharee device,the shared read access request including the sharee identifier, thedocument identifier, and the second cryptographic share value. Theoperations also include determining a cryptographic read access valuebased on the first cryptographic share value and the secondcryptographic share value, the cryptographic read access valueauthorizing read access to the sharee for the document. The operationsfurther include storing a read access token for the sharee including thecryptographic read access value and the encrypted value in a user readset of the memory hardware, the user read set including a list of shareeidentifiers associated with sharees having read access to the document.

Implementations of the disclosure may include one or more of thefollowing optional features. In some implementations, determining thecryptographic read access value includes multiplying the firstcryptographic share value and the second cryptographic share value. Theoperations may also include receiving a revoke read access command fromthe sharor device revoking read access from the sharee for the documentstored on the storage system and removing the read access token for thesharee from the user read set. In response to receiving the revoke readaccess command, the operations may include determining whether acorresponding write access token exists for the sharee in a user writeset of the memory hardware and when the corresponding write access tokenexists, removing, by the data processing hardware, the write accesstoken from the memory hardware.

After storing the read access token for the sharee, the operations mayinclude receiving a search query for a keyword in the document from thesharee device. The search query may include the sharee identifier, thedocument identifier and a cryptographic search value based on the readkey for the document, the keyword, and the sharee cryptographic keyassociated with the sharee. The operations may also include retrievingthe read access token for the sharee from the user read set of thememory hardware, computing a cryptographic word set token based on thereceived cryptographic search value and the retrieved read access tokenfor the sharee, and determining whether the computed cryptographic wordset token matches a corresponding cryptographic word set token of a wordset stored in the memory hardware. When the computed cryptographic wordset token matches the corresponding cryptographic word set token of theword set, the method may include retrieving encrypted word metadata ofthe document associated with the keyword from the memory hardware andsending a search result set to the sharee device, the query responseincluding the encrypted document metadata and the encrypted wordmetadata. The sharee may be configured to decrypt the encrypted documentmetadata using the read key and decrypt the encrypted word metadatausing the read key.

Yet another aspect of the disclosure provides a second system forsharing write access to a document. The system includes a sharor deviceassociated with a creator of a document stored on a distributed storagesystem, a sharee device in communication with the sharor device over asecure and authenticated communication channel, data processing hardwareof the distributed storage system in communication with the sharordevice and the sharee device, and memory hardware in communication withthe data processing hardware. The sharee device is configured to receiveshared write access permissions from the sharor device sharing writeaccess for a document stored on the distributed storage system,determine a cryptographic write access value based on the write key forthe document, a document identifier identifying the document, a shareeidentifier identifying the sharee, and a sharee cryptographic keyassociated with the sharee and determine a cryptographic read accessvalue based on the write key for the document, the document identifier,and the sharee cryptographic key. The shared write access permissionsinclude a read key for the document, a write key for the document andencrypted metadata for the document. The cryptographic write accessvalue authorizes write access to the sharee for the document. The memoryhardware stores instructions that when executed on the data processinghardware cause the data processing hardware to perform operations. Theoperations include receiving a write access token for the sharee deviceincluding the cryptographic write access value from the sharee deviceand storing the write access token in a user write set. The user writeset includes a list of sharee identifiers associated with sharee deviceshaving write access to the document. The operations also includereceiving a read access token for the sharee device including thecryptographic read access value and the encrypted metadata for thedocument from the sharee device and storing the read access token in auser read set. The user read set includes a list of sharee identifiersassociated with sharee devices having read access to the document.

Implementations of the disclosure may include one or more of thefollowing optional features. In some implementations, the operationsinclude receiving a revoke write access command from the sharor deviceto revoke write access from the sharee device for the document stored onthe distributed storage system. In response to receiving the revokewrite access command, the operations may include removing the writeaccess token for the sharee device from the user write set. Theoperations may also include receiving a revoke read access command fromthe sharor device to revoke read access from the sharee device for thedocument stored on the distributed storage system. In response toreceiving the revoke read access command, the operations may alsoinclude removing the write access token for the sharee device from theuser write set and removing the read access token for the sharee devicefrom the user read set.

SECTION B: Efficient Oblivious Permutation

One aspect of the disclosure provides a method for obliviously movingdata blocks to new memory locations on memory hardware. The methodincludes receiving, at data processing hardware, a permutation requestfrom a client to obliviously move N data blocks stored in memoryhardware in communication with the data processing hardware. Each N datablock is associated with the client and stored at a corresponding memorylocation of the memory hardware. In response to receiving thepermutation request, the method includes dividing, by the dataprocessing hardware, the memory locations of the memory hardware into√{square root over (N)} data buckets. Each data bucket contains √{squareroot over (N)} data blocks. The method also includes allocating, by thedata processing hardware, new memory locations in the memory hardwarefor storing the N data blocks and initializing, by the data processinghardware, √{square root over (N)} buffer buckets associated with the newmemory locations. Each buffer bucket is associated with a correspondingcache slot initialized at the client. The method further includesiteratively providing the √{square root over (N)} data buckets from thedata processing hardware to the client. In response to receiving eachdata bucket, the client is configured to: apply a random permutation onthe √{square root over (N)} data blocks within the corresponding databucket to determine the corresponding new memory location of the memoryhardware and the corresponding buffer bucket associated with eachpermutated data block; provide each permutated data block into thecorresponding cache slot; spray up to a threshold value of thepermutated data blocks from each cache slot into the correspondingbuffer buckets; and store any remaining permuted data blocks in thecorresponding cache slots.

Implementations of the disclosure may include one or more of thefollowing optional features. In some examples, substantially √{squareroot over (N)} encompasses a range of values, such as between N^(0.1)and N^(0.75). Other ranges are possible as well. In additional examples,substantially √{square root over (N)} includes: N^(0.5), which providesan algorithm with one round-trip); N^(1/3), which provides an algorithmwith 2 round-trips; and N^(0.20), which provides an algorithm with 4round-trips. Relatively smaller values, may be less useful, since Ncould be impractically large. For relatively larger values, the gain inthe algorithm may be less useful as well. In some implementations, theclient applies the random permutation on the √{square root over (N)}data blocks within the corresponding data bucket by: decrypting each ofthe √{square root over (N)} data blocks received within thecorresponding data bucket; re-encrypting each of the √{square root over(N)} data blocks; and applying the random permutation on there-encrypted √{square root over (N)} data blocks. The random permutationmay include shuffling the re-encrypted √{square root over (N)} datablocks at the client using random bits hidden from the data processinghardware based on an Advanced Encryption Standard key randomly selectedby the client.

In some examples, the threshold value of the permutated data blockssprayed from each cache slot is randomly selected independent of thenumber of permuted data blocks currently stored within the correspondingcache slots. The threshold value of the permutated data blocks sprayedfrom at least one of the cache slots may be different during at leastone iteration. The client may spray a number of the permutated datablocks equal to the threshold value from a corresponding client cachewhen the corresponding cache slot contains at least the threshold valueof the permutated data blocks.

In some implementations, the client is further configured to: after theclient provides each permutated data block into the corresponding cacheslot, identify at least one cache slot containing a number of thepermutated data blocks less than the threshold value; and spray a numberof dummy blocks into the corresponding buffer bucket based on adifference between the threshold value and the number of permutated datablocks within the corresponding cache slot. The client may encrypt eachdummy block prior to spraying each dummy block into the correspondingbuffer bucket.

In some examples, iteratively providing the √{square root over (N)} databuckets from the data processing hardware to the client includes:iteratively receiving a bucket download request from the clientrequesting one of the data buckets for download; and in response toreceiving each bucket download request, uploading the corresponding databucket to the client. After the client sprays all of the permutated datablocks from all of the cache slots into the corresponding bufferbuckets, the method may include de-allocating, by the data processinghardware, all of the data buckets from the memory hardware. After theclient sprays all of the permutated data blocks from all of the cacheslots into the corresponding buffer buckets, the method may include:de-allocating, by the data processing hardware, all of the data bucketsfrom the memory hardware; and iteratively providing the √{square rootover (N)} buffer buckets from the data processing hardware to theclient. In response to receiving each buffer bucket, the client may beconfigured to: remove any dummy blocks from the corresponding bufferbucket; re-order the data blocks within the corresponding buffer bucket;and upload the buffer bucket to the distributed system.

Another aspect of the disclosure provides a system for obliviouslymoving data blocks to new memory locations on memory hardware. Thesystem includes a client device, data processing hardware of adistributed system in communication with the client device, and memoryhardware in communication with the data processing hardware. The memoryhardware stores instructions that when executed on the data processinghardware cause the data processing hardware to perform operations. Theoperations include receiving a permutation request from the clientdevice to obliviously move N data blocks stored in memory hardware incommunication with the data processing hardware, each N data blockassociated with the client device and stored at a corresponding memorylocation of the memory hardware. In response to receiving thepermutation request, the operations include dividing the memorylocations of the memory hardware into √{square root over (N)} databuckets. Each data bucket contains √{square root over (N)} data blocks.The operations also include allocating new memory locations in thememory hardware for storing the N data blocks and initializing √{squareroot over (N)} buffer buckets associated with the new memory locations.Each buffer bucket is associated with a corresponding cache slotinitialized at the client device. The operations also includeiteratively providing the √{square root over (N)} data buckets to theclient device. In response to receiving each data bucket, the clientdevice is configured to: apply a random permutation on the √{square rootover (N)} data blocks within the corresponding data bucket to determinethe corresponding new memory location of the memory hardware and thecorresponding buffer bucket associated with each permutated data block;provide each permutated data block into the corresponding cache slot;spray up to a threshold value of the permutated data blocks from eachcache slot into the corresponding buffer buckets; and store anyremaining permuted data blocks in the corresponding cache slots.

This aspect may include one or more of the following optional features.In some implementations the client device applies the random permutationon the √{square root over (N)} data blocks within the corresponding databucket by: decrypting each of the √{square root over (N)} data blocksreceived within the corresponding data bucket; re-encrypting each of the√{square root over (N)} data blocks; and applying the random permutationon the re-encrypted √{square root over (N)} data blocks. The randompermutation may include shuffling the re-encrypted √{square root over(N)} data blocks at the client device using random bits hidden from thedata processing hardware based on an Advanced Encryption Standard keyrandomly selected by the client device.

In some examples, the threshold value of the permutated data blockssprayed from each cache slot is randomly selected independent of thenumber of permuted data blocks currently stored within the correspondingcache slots. The threshold value of the permutated data blocks sprayedfrom at least one of the cache slots may be different during at leastone iteration. The client device may spray a number of the permutateddata blocks equal to the threshold value from a corresponding clientcache when the corresponding cache slot contains at least the thresholdvalue of the permutated data blocks.

In some implementations the client device is further configured to:after the client device provides each permutated data block into thecorresponding cache slot, identify at least one cache slot containing anumber of the permutated data blocks less than the threshold value; andspray a number of dummy blocks into the corresponding buffer bucketbased on a difference between the threshold value and the number ofpermutated data blocks within the corresponding cache slot. The clientdevice may also be configured to encrypt each dummy block prior tospraying each dummy block into the corresponding buffer bucket.

In some examples, iteratively providing the √{square root over (N)} databuckets to the client device includes: iteratively receiving a bucketdownload request from the client device requesting one of the databuckets for download; and in response to receiving each bucket downloadrequest, uploading the corresponding data bucket to the client device.The operations may further include, after the client device sprays allof the permutated data blocks from all of the cache slots into thecorresponding buffer buckets, de-allocating all of the data buckets fromthe memory hardware. The operations may further include, after theclient device sprays all of the permutated data blocks from all of thecache slots into the corresponding buffer buckets: de-allocating all ofthe data buckets from the memory hardware; and iteratively providing the√{square root over (N)} buffer buckets to the client. In response toreceiving each buffer bucket, the client may be configured to: removeany dummy blocks from the corresponding buffer bucket; re-order the datablocks within the corresponding buffer bucket; and upload the bufferbucket to the distributed system.

Another aspect of the disclosure provides a method for obliviouslymoving N data blocks stored in memory hardware in communication withdata processing hardware. Each N data block is associated with a clientand stored at a corresponding memory location of the memory hardware.The method includes organizing, by the data processing hardware, thememory locations of the memory hardware into substantially √{square rootover (N)} data buckets. Each data bucket contains substantially √{squareroot over (N)} data blocks. The method also includes allocating, by thedata processing hardware, substantially √{square root over (N)} bufferbuckets associated with new memory locations in the memory hardware.Each buffer bucket is associated with a corresponding cache slotallocated at the client for storing cached permutated data blocks. Themethod further includes iteratively providing the substantially √{squareroot over (N)} data buckets from the data processing hardware to theclient. In response to receiving each data bucket, the client isconfigured to apply a random permutation on the substantially √{squareroot over (N)} data blocks within the corresponding data bucket togenerate permutated data blocks and determine a corresponding bufferbucket and a corresponding cache slot for each permutated data block.For each buffer bucket, the client is configured to determine a quantityof data blocks to be sprayed into the buffer bucket and a strategy forselecting data blocks to be sprayed into the buffer bucket from at leastone of: corresponding permutated data blocks; cached permutated datablocks from the corresponding cache slot; or dummy data blocks. Theclient is further configured to: spray the selected data blocks into thebuffer buckets according to the strategy; store any unselectedpermutated data blocks in their corresponding cache slots; and removeany selected cached permutated data blocks from their correspondingcache slots.

Implementations of the disclosure may include one or more of thefollowing optional features. In some implementations, the client appliesthe random permutation on the substantially √{square root over (N)} datablocks within the corresponding data bucket by: decrypting each of thesubstantially √{square root over (N)} data blocks received within thecorresponding data bucket; re-encrypting each of the substantially√{square root over (N)} data blocks; and applying the random permutationto the re-encrypted substantially √{square root over (N)} data blocks.The random permutation may include shuffling the re-encryptedsubstantially √{square root over (N)} data blocks at the client using acryptographically secure random key hidden from the data processinghardware.

In some examples, the quantity of data blocks to be sprayed into abuffer bucket is determined independently from the number of permuteddata blocks corresponding to the buffer bucket. The quantity of datablocks to be sprayed into one buffer bucket may be different than thequantity of data blocks to be sprayed into another bucket during thesame iteration. The quantity of data blocks to be sprayed into onebuffer bucket may be different than the quantity of data blocks to besprayed into another bucket between separate iterations. Selecting datablocks to be sprayed into the buffer bucket may follow a strict priorityorder including: first, selecting from the corresponding permutated datablocks; second, selecting from the cached permutated data blocks fromthe corresponding cache slot; and third, selecting dummy data blocks.The client may encrypt each dummy block prior to spraying each dummyblock into the corresponding buffer bucket.

In some implementations, iteratively providing the substantially√{square root over (N)} data buckets from the data processing hardwareto the client includes: iteratively receiving a bucket download requestfrom the client requesting one of the data buckets for download; and inresponse to receiving each bucket download request, sending thecorresponding data bucket to the client. After the client sprays all ofthe permutated data blocks from all of the cache slots into thecorresponding buffer buckets, the method may include de-allocating, bythe data processing hardware, all of the data buckets from the memoryhardware. After the client sprays all of the permutated data blocks fromall of the cache slots into the corresponding buffer buckets, the methodmay also include iteratively providing the substantially √{square rootover (N)} buffer buckets from the data processing hardware to theclient. In response to receiving each buffer bucket, the client may beconfigured to: remove any dummy blocks from the corresponding bufferbucket; order the data blocks within the corresponding buffer bucket;and upload the buffer bucket to the data processing hardware.

Another aspect of the disclosure provides a system for obliviouslymoving N data blocks in a distributed system. Each N data block isassociated with a client and stored at a corresponding memory locationof the distributed system. The system includes a client deviceassociated with the client, data processing hardware of the distributedsystem in communication with the client device and memory hardware incommunication with the data processing hardware. The memory hardwarestores instructions that when executed on the data processing hardwarecause the data processing hardware to perform operations. The operationsinclude organizing the memory locations of the memory hardware intosubstantially √{square root over (N)} data buckets, allocatingsubstantially √{square root over (N)} buffer buckets associated with newmemory locations in the memory hardware, and iteratively providing thesubstantially √{square root over (N)} data buckets from the dataprocessing hardware to the client device. Each data bucket containssubstantially √{square root over (N)} data blocks. Each buffer packet isassociated with a corresponding cache slot allocated at the clientdevice for storing cached permutated data blocks. In response toreceiving each data bucket, the client is configured to apply a randompermutation on the substantially √{square root over (N)} data blockswithin the corresponding data bucket to generate permutated data blocksand determine a corresponding buffer bucket and a corresponding cacheslot for each permutated data block. For each buffer bucket, the clientis configured to determine a quantity of data blocks to be sprayed intothe buffer bucket and a strategy for selecting data blocks to be sprayedinto the buffer bucket from at least one of: corresponding permutateddata blocks; cached permutated data blocks from the corresponding cacheslot; or dummy data blocks. The client is also configured to: spray theselected data blocks into the buffer buckets according to the strategy;store any unselected permutated data blocks in their corresponding cacheslots; and remove any selected cached permutated data blocks from theircorresponding cache slots.

This aspect may include one or more of the following optional features.In some implementations, the client device applies the randompermutation on the substantially √{square root over (N)} data blockswithin the corresponding full bucket by: decrypting each of thesubstantially √{square root over (N)} data blocks received within thecorresponding data bucket; re-encrypting each of the substantially√{square root over (N)} data blocks; and applying the random permutationto the re-encrypted substantially √{square root over (N)} data blocks.The random permutation may include shuffling the re-encryptedsubstantially √{square root over (N)} data blocks at the client using acryptographically secure random key hidden from the data processinghardware.

In some examples, the quantity of data blocks to be sprayed into abuffer bucket is determined independently from the number of permuteddata blocks corresponding to the buffer bucket. The quantity of datablocks to be sprayed into one buffer bucket may be different than thequantity of data blocks to be sprayed into another bucket during thesame iteration. The quantity of data blocks to be sprayed into onebuffer bucket may be different than the quantity of data blocks to besprayed into another bucket between separate iterations. Selecting datablocks to be sprayed into the buffer bucket may follow a strict priorityorder including: first, selecting from the corresponding permutated datablocks; second, selecting from the cached permutated data blocks fromthe corresponding cache slot; and third, selecting dummy data blocks.The client device may further be configured to encrypt each dummy blockprior to spraying each dummy block into the corresponding buffer bucket.

In some examples, iteratively providing the substantially √{square rootover (N)} data buckets from the data processing hardware to the clientdevice includes: iteratively receiving a bucket download request fromthe client requesting one of the data buckets for download; and inresponse to receiving each bucket download request, sending thecorresponding data bucket to the client. The operations may also includeafter the client device sprays all of the permutated data blocks fromall of the cache slots into the corresponding buffer buckets,de-allocating all of the data buckets from the memory hardware. Theoperations may further include after the client device sprays all of thepermutated data blocks from all of the cache slots into thecorresponding buffer buckets, iteratively providing the substantially√{square root over (N)} buffer buckets to the client device. In responseto receiving each buffer bucket, the client device may be configured to:remove any dummy blocks from the corresponding buffer bucket; order thedata blocks within the corresponding buffer bucket; and upload thebuffer bucket to the data processing hardware.

SECTION C: Efficient Oblivious Cloud Storage

One aspect of the disclosure provides a method obliviously executingqueries for data blocks. The method includes executing, at dataprocessing hardware, an instruction to execute a query (q) for a datablock (B), obtaining, by the data processing hardware, a query memorylevel (l_(q)) corresponding to the data block (B) from a memory-levelmap, and determining, by the data processing hardware, whether the querymemory level (l_(q)) is the lowest memory level (l_(l)), (l_(q)=l_(l)).The memory-level map maps memory levels (l_(i)) of memory, each memorylevel (l_(i)) including physical memory (RAM_(i)) and virtual memory(Shelter_(i)). The virtual memory (Shelter_(i)) of a lowest memory level(l_(l)) resides on a client device and the remaining physical memory(RAM_(i)) and virtual memory (Shelter_(i)) reside on memory hardware ofa distributed system in communication with the data processing hardware.When the query memory level (l_(q)) is the lowest memory level (l_(l)),(l_(q)=l_(l)), the method includes retrieving, by the data processinghardware, the data block (B) from the virtual memory (Shelter_(l)) ofthe lowest memory level (l_(l)). For each memory level (l_(j)) greaterthan the lowest memory level (l_(l)) and the physical memory (RAM_(l))at the lowest memory level (l_(l)), the method includes retrieving, bythe data processing hardware, a corresponding dummy data block (D_(j))from the respective memory level (l_(j)), (l_(l)) and discarding, by thedata processing hardware, the retrieved dummy data block (D_(j)). Whenthe memory level (l_(q)) is not the lowest memory level (l_(l)),(l_(q)<l_(l)), the method includes retrieving, by the data processinghardware, the data block (B) from the query memory level (l_(q)) andstoring the retrieved data block (B) in the virtual memory (Shelter_(l))of the lowest memory level (l_(l)). For each memory level (l_(j)) otherthan the query memory level (l_(q)), the method includes retrieving, bythe data processing hardware, the corresponding dummy data block (D_(j))from the respective memory level (l_(j)) and discarding, by the dataprocessing hardware, the retrieved dummy data block (D_(j)).

Implementations of the disclosure may include one or more of thefollowing optional features. In some implementations, for each memorylevel (l_(i)), the physical memory (RAM_(i)) has a defined first size tohold N_(i) data blocks (B) and the virtual memory (Shelter_(i)) has adefined second size to hold S_(i) data blocks (B), wherein S_(i)=N_(i)/cand c is a constant greater than one. The corresponding dummy data block(D_(j)) of the respective memory level (l_(j)) includes a permutation(π_(j)) of a pointer (dCnt_(j)) to a respective data block (N_(j)) atthe respective memory level (l_(j)). The method may also includeincrementing, by the data processing hardware, the pointer (dCnt_(j)).

In some examples, when the memory level (l_(q)) is not the lowest memorylevel (l_(l)), the method includes updating, by the data processinghardware, the level map to indicate that the retrieved data block isstored in the virtual memory (Shelter_(l)) of the lowest memory level(l_(l)). The distributed system may be configured to initialize at leastone data block (N_(i)) of the corresponding virtual memory (Shelter_(i))of at least one memory level (l_(i)) as a respective dummy data block(D_(i)). The respective dummy data block (D_(i)) may include apermutation of a size of the corresponding data block (N_(i)), an indexof the corresponding data block (N_(i)), or a memory level number of thecorresponding memory level (l_(i)).

In some implementations, the method includes obliviously shuffling, bythe data processing hardware, the corresponding virtual memory(Shelter_(i)) of each memory level (l_(i)). The method may also includeobliviously shuffling, by the data processing hardware, the virtualmemory (Shelter_(l)) of the lowest memory level (l_(l)) with the virtualmemory (Shelter_(l-1)) of a next memory level (l_(i)) greater than thelowest memory level (l_(l)). Obliviously shuffling may further include:selecting a random permutation on the data blocks (B) from the virtualmemory (Shelter_(l)), (Shelter_(l-1)); decrypting each of the datablocks (B) from the virtual memory (Shelter_(l)), (Shelter_(l-1));re-encrypting each of the data blocks (B) from the virtual memory(Shelter_(l)), (Shelter_(l-1)); and shuffling the re-encrypted datablocks (B) using the random permutation on the re-encrypted data blocks(B).

Another aspect of the disclosure provides a client device forobliviously executing queries for data blocks. The client deviceincludes data processing hardware and memory hardware in communicationwith the data processing hardware. The memory hardware storesinstructions that when executed on the data processing hardware causethe data processing hardware to perform operations. The operationsinclude executing, at data processing hardware, an instruction toexecute a query (q) for a data block (B), obtaining a query memory level(l_(q)) corresponding to the data block (B) from a memory-level map, thememory-level map mapping memory levels (l_(i)) of memory, anddetermining whether the query memory level (l_(q)) is the lowest memorylevel (l_(l)), (l_(q)=l_(l)). Each memory level (l_(i)) includesphysical memory (RAM_(i)) and virtual memory (Shelter_(i)). The virtualmemory (Shelter_(i)) of a lowest memory level (l_(i)) resides on thememory hardware of the client device and the remaining physical memory(RAM_(i)) and virtual memory (Shelter_(i)) reside on memory hardware ofa distributed system in communication with the data processing hardware.When the query memory level (l_(q)) is the lowest memory level (l_(l)),(l_(q)=l_(l)), the operations include retrieving the data block (B) fromthe virtual memory (Shelter_(l)) of the lowest memory level (l_(l)). Foreach memory level (l_(j)) greater than the lowest memory level (l_(l))and the physical memory (RAM_(l)) at the lowest memory level (l_(l)),the operations include retrieving a corresponding dummy data block(D_(j)) from the respective memory level (l_(j)), (l_(l)) and discardingthe retrieved dummy data block (D_(j)). When the memory level (l_(q)) isnot the lowest memory level (l_(l)), (l_(q)<l_(l)), the operationsinclude retrieving the data block (B) from the query memory level(l_(q)) and storing the retrieved data block (B) in the virtual memory(Shelter_(l)) of the lowest memory level (l_(l)). For each memory level(l_(j)) other than the query memory level (l_(q)), the operationsinclude retrieving the corresponding dummy data block (D_(j)) from therespective memory level (l_(j)) and discarding the retrieved dummy datablock (D_(j)).

This aspect may include one or more of the following optional features.In some implementations, for each memory level (l_(i)), the physicalmemory (RAM_(i)) has a defined first size to hold N_(i) data blocks (B)and the virtual memory (Shelter_(i)) has a defined second size to holdS_(i) data blocks (B), wherein S_(i)=N_(i)/c and c is a constant greaterthan one. The corresponding dummy data block (D_(j)) of the respectivememory level (l_(j)) may include a permutation (π_(j)) of a pointer(dCnt_(j)) to a respective data block (N_(j)) at the respective memorylevel (l_(j)). The operations may also include incrementing the pointer(dCnt_(j)).

When the memory level (l_(q)) is not the lowest memory level (l_(l)),the operations may include updating the level map to indicate that theretrieved data block is stored in the virtual memory (Shelter_(l)) ofthe lowest memory level (l_(l)). The distributed system may beconfigured to initialize at least one data block (N_(i)) of thecorresponding virtual memory (Shelter_(i)) of at least one memory level(l_(i)) as a respective dummy data block (D_(i)). The respective dummyblock may include a permutation of a size of the corresponding datablock (N_(i)), an index of the corresponding data block (N_(i)), or amemory level number of the corresponding memory level (l_(i)).

In some examples, the operations include obliviously shuffling thecorresponding virtual memory (Shelter_(i)) of each memory level (l_(i)).The operations may also include obliviously shuffling the virtual memory(Shelter_(l)) of the lowest memory level (l_(l)) with the virtual memory(Shelter_(i−1)) of a next memory level (l_(i)) greater than the lowestmemory level (l_(l)). Obliviously shuffling may further include:selecting a random permutation for the data blocks (B) from the virtualmemory (Shelter_(l)), (Shelter_(l-1)); decrypting each of the datablocks (B) from the virtual memory (Shelter_(l)), (Shelter_(l-1));re-encrypting each of the data blocks (B) from the virtual memory(Shelter_(l)), (Shelter_(l-1)); and shuffling the re-encrypted datablocks (B) using the random permutation on the re-encrypted data blocks(B).

SECTION D: Oblivious Access with Differential Privacy

One aspect of the disclosure provides a method for oblivious access withdifferential privacy. The method includes executing, by data processinghardware of a client device, an instruction to execute a query (q) for adata block. The method also includes, during a download phase,determining, by the data processing hardware, whether the data block isstored in a block stash on memory hardware residing at the clientdevice. When the data block is stored in the block stash, the methodfurther includes: removing, by the data processing hardware, the datablock from the block stash; sending, by the data processing hardware, afake query to a distributed system in communication with the dataprocessing hardware; and discarding, by the data processing hardware,the random data block retrieved from the distributed system. The fakequery retrieves a random data block stored in memory of the distributedsystem. During an overwrite phase, the method also includes executing,by the data processing hardware, a read or write operation on the datablock removed from the block stash or retrieved from the memory of thedistributed system. The method further includes determining, by the dataprocessing hardware, whether to store a current version of the datablock in the block stash on the memory hardware residing at the clientdevice or on the memory of the distributed system based on aprobability. When the current version of the data block is stored in theblock stash, the method includes: sending, by the data processinghardware, a fake query to the distributed system to retrieve anotherrandom data block stored in the memory of the distributed system;decrypting, by the data processing hardware, the retrieved random datablock; re-encrypting, by the data processing hardware, the random datablock with fresh randomness; and re-uploading, by the data processinghardware, the re-encrypted random data block onto the memory of thedistributed system.

Implementations of the disclosure may include one or more of thefollowing optional features. In some implementations, when the datablock is not stored in the block stash during the download phase, themethod includes sending, by the data processing hardware, a real queryto the distributed system to retrieve the data block from the memory ofthe distributed system. When executing the read or write operation onthe data block during the overwrite phase, the method may also includeexecuting a write operation by updating the data block with a newversion of the data block. In some configurations, the probability isless than (C/N), where C is a storage capacity of the block stash and Nis a number of data blocks outsourced by the data processing hardwarefor storage on the distributed system.

In some examples, when the current version of the data block is notstored in the block stash during the overwrite phase, the method alsoincludes the following: sending, by the data processing hardware, a realquery to the distributed system to retrieve the data block from thememory of the distributed system; encrypting, by the data processinghardware, the current version of the data block; and uploading, by thedata processing hardware, the encrypted current version of the datablock onto the memory of the distributed system. Here, the method mayfurther include discarding the data block retrieved from the memory ofthe distributed system.

Another aspect of the disclosure provides a method for oblivious accesswith differential privacy. The method includes executing, by dataprocessing hardware of a client device, an instruction to execute aquery (q) for a data block. During a download phase, the method includesdetermining, by the data processing hardware, whether the data block isstored in a block stash on memory hardware residing at the clientdevice. When the data block is stored in the block stash, the methodalso includes: removing, by the data processing hardware, the data blockfrom the block stash; sending, by the data processing hardware, a fakequery to a distributed system in communication with the data processinghardware; and discarding, by the data processing hardware, the randomdata buckets retrieved from the distributed system. The fake querydownloads two random data buckets stored in memory of the distributedsystem and each of the data buckets includes multiple data blocks.During an overwrite phase, the method further includes executing, by thedata processing hardware, a read or write operation on the data blockremoved from the block stash or obtained from a corresponding databucket retrieved from memory of the distributed system. The method alsoincludes determining, by the data processing hardware, whether to storea current version of the data block in the block stash or on the memoryof the distributed system based on a probability. When the currentversion of the data block is stored in the block stash, the methodincludes: sending, by the data processing hardware, a fake query to thedistributed system to download another two random data buckets stored inthe memory of the distributed system, each data bucket includingmultiple data blocks; decrypting, by the data processing hardware, allof the data blocks within the random data buckets; re-encrypting, by thedata processing hardware, the data blocks within the random data bucketswith fresh randomness; and re-uploading, by the data processinghardware, the random data buckets including the re-encrypted data blocksonto the memory of the distributed system.

Implementations of the disclosure may include one or more of thefollowing optional features. In some configurations, when the data blockis not stored in the block stash during the download phase, the methodincludes sending, by the data processing hardware, a real query to thedistributed system to download a pair of data buckets from the memory ofthe distributed system; decrypting, by the data processing hardware, allof the data blocks within the two data buckets; and determining, by thedata processing hardware, whether one of the two data buckets includesthe data block. Here, each of the data buckets downloaded from thedistributed system in response to the real query includes multiple datablocks and a corresponding cryptographic identifier associated with anidentifier of the data block. In these configurations, when one of thedata buckets includes the data block, the method further includes:removing, by the data processing hardware, the data block from thecorresponding data bucket; and discarding, by the data processinghardware, the remaining data blocks from the data buckets.

In some examples, the identifier of the data block includes a string.Executing the read or write operation on the data block during theoverwrite phase may also include executing a write operation by updatingthe data block with a new version of the data block. The probability maybe less than (C/N), where C is a storage capacity of the block stash andN is a number of data blocks outsourced by the data processing hardwarefor storage on the distributed system.

In some implementations, when the current version of the data block isnot stored in the block stash during the overwrite phase, the methodincludes sending, by the data processing hardware, a real query to thedistributed system to download a pair of data buckets from the memory ofthe distributed system. Here, each of the data buckets downloaded fromthe distributed system in response to the real query includes multipledata blocks and a corresponding cryptographic identifier associated withan identifier of the data block. In this implementation, when thecurrent version of the data block is not stored in the block stashduring the overwrite phase, the method also includes: decrypting, by thedata processing hardware, all of the data blocks within the databuckets; replacing, by the data processing hardware, a previous versionof the data block within one of the data buckets with the currentversion of the data block; re-encrypting, by the data processinghardware, all of the data blocks including the current version of thedata block within the data buckets; and uploading, by the dataprocessing hardware, the data buckets including the re-encrypted datablocks onto the memory of the distributed system.

Yet another aspect of the disclosure provides a method for obliviousaccess with differential privacy. The method include executing, by dataprocessing hardware of a client device, an instruction to execute aquery (q) for a data block stored on a server. The method also includessending a first download request for K blocks stored on the server, theK blocks excluding the queried data block and sending a second downloadrequest for the queried data block and K−1 other blocks. The methodfurther includes receiving a first download sequence for the K blocks ofthe first download request from the server and receiving a seconddownload sequence for the queried data block and the K−1 other blocks ofthe second download request from the server.

Implementations of the disclosure may include one or more of thefollowing optional features. In some examples, the server is untrustedand stores a plurality of publically available data blocks that areun-encrypted. The method may include discarding, by the data processinghardware, the K blocks of first download sequence received from theserver. Additionally or alternatively, the method may also includediscarding, by the data processing hardware, the K−1 other blocks of thesecond download sequence received from the server. The value for K maybe based on a security parameter and an error probability greater thanzero.

The details of one or more implementations of the disclosure are setforth in the accompanying drawings and the description below. Otheraspects, features, and advantages will be apparent from the descriptionand drawings, and from the claims.

DESCRIPTION OF DRAWINGS

FIG. 1.1 is a schematic view of an example system for sharing readand/or write access to one or more documents stored on a distributedstorage system.

FIG. 1.2A is a schematic view of an example read access token stored ina user read set.

FIG. 1.2B is a schematic view of an example write access token stored ina user write set.

FIG. 1.3A is a schematic view of an example system for a sharor sharingread access to a sharee for a document stored on a distributed storagesystem.

FIG. 1.3B is a schematic view of an example system for a sharingrevoking read access from a sharee for a document stored on adistributed storage system.

FIG. 1.4A is a schematic view of an example system for a sharor sharingwrite access to a sharee for a document stored on a distributed storagesystem.

FIG. 1.4B is a schematic view of an example system for a sharingrevoking write access from a sharee for a document stored on adistributed storage system.

FIGS. 1.5A and 1.5B are schematic views of a user sending a search queryto a searchable symmetric encryption manager for a keyword in anencrypted document stored in a data store.

FIG. 1.5C provides an example algorithm for a user performing a searchfor a keyword over a set of documents that the user has read access to.

FIGS. 1.6A and 1.6B are schematic views of a user sending an editoperation request to a searchable symmetric encryption manager forprocessing an edit operation on a word in an encrypted document storedin a data store.

FIG. 1.6C provides an example algorithm for a user performing an editoperation on a word in a document that the user has write access to.

FIG. 1.7 is a flowchart of an example method for sharing read access toa document.

FIG. 1.8 is a flow chart of an example method for sharing write accessto a document.

FIG. 1.9 is a schematic view of an example computing device.

FIG. 2.1 is a schematic view of an example system for obliviously movingdata blocks stored on non-transitory data storage of a distributedsystem.

FIG. 2.2 is a schematic view of an example system for allowing one ormore clients to obliviously move data blocks stored on non-transitorydata storage of a distributed storage system.

FIGS. 2.3A-2.3J are schematic views of an example oblivious permutationroutine for obviously moving data blocks stored on memory hardware.

FIGS. 2.4A and 2.4B are schematic views of an example recalibrationprocess for recalibrating buffer buckets stored on memory hardware.

FIG. 2.5 is an example algorithm for applying obliviously shuffling at aclient device.

FIG. 2.6 is an example algorithm for applying obliviously shuffling at aclient device.

FIG. 2.7 is a schematic view of an example arrangement of operations fora method of obliviously moving data blocks stored on memory hardware.

FIG. 2.8 is a schematic view of an example computing device executing anoblivious permutation routine.

FIG. 3.1A is a schematic view of an example system for obliviouslyexecuting queries for data blocks stored on non-transitory data storageof a distributed system.

FIG. 3.1B is a schematic view of an example system for allowing one ormore clients to obliviously execute queries for data blocks stored onnon-transitory data storage of a distributed storage system.

FIG. 3.2 provides a schematic view of example memory levels includingtwo levels of non-transitory memory.

FIG. 3.3 provides a schematic view of an example memory-level map formapping memory levels of non-transitory memory.

FIGS. 3.4A and 3.4B provide an example instruction executing on a clientdevice to execute a query for a data block.

FIG. 3.5 provides an example algorithm for initializing memory levels ofnon-transitory memory.

FIG. 3.6 provides an example algorithm for execution of an instructionat a client device to execute a query for a data block

FIGS. 3.7A and 3.7B illustrate a method for obliviously executingqueries for data blocks.

FIG. 3.8 is a schematic view of an example computing device executing aquery for a data block.

FIG. 4.1A is a schematic view of an example system for obliviouslyexecuting queries for data blocks stored on non-transitory data storageof a distributed system.

FIG. 4.1B is a schematic view of an example system for allowing one ormore clients to obliviously execute queries for data blocks stored onnon-transitory data storage of a distributed storage system.

FIGS. 4.2A and 4.2B are schematic views of an example differentiallyprivate (DP) private information retrieval (PIR) routine for obliviouslyexecuting queries stored on non-transitory data storage of a singleserver or of multiple servers.

FIGS. 4.3A-4.3D are schematic views of an example DP oblivious randomaccess memory (O-RAM) routine for obliviously executing queries storedon non-transitory data storage of a distributed system.

FIGS. 4.4A-4.4C are schematic views of an example DP oblivious storageroutine for obliviously inputting data blocks in encrypted form ontonon-transitory data storage of a distributed system.

FIGS. 4.5A-4.5D are schematic views of an example DP oblivious storageinstruction executing on a client device to execute a query for a datablock.

FIG. 4.6 provides an example algorithm initializing the binary tree byinputting data blocks in encrypted form into corresponding buckets andexecuting a query fora data block.

FIG. 4.7 is a schematic view of an example reverse exponential tree.

FIG. 4.8 provides an example algorithm initializing a reverseexponential tree by inputting the data blocks in encrypted form intocorresponding N buckets and executing a query for a data block.

FIG. 4.9 is a schematic view of an example computing device that may beused to implement the systems and methods described herein.

Like reference symbols in the various drawings indicate like elements.

DETAILED DESCRIPTION

SECTION 1: Encrypted Search Cloud Service with Cryptographic Sharing

Searchable Symmetric Encryption schemes are tailored to allow a cloudstorage provider to provide search functionality over a set of encrypteditems (e.g., documents, emails, calendar events, notes, databaseentries, etc.) uploaded and stored at the cloud storage provider.Implementations herein are directed toward allowing customers (e.g.,enterprises) to encrypt their data locally with customer side keysbefore uploading the data to the cloud service provider and withoutgiving the cloud service provider plaintext access to the encrypteddata. Namely, the cloud storage provider stores a cryptographic readaccess token in a user read set for each user authorized by the customerfor read access to a corresponding document stored at the cloud storageprovider. The cloud storage provider also stores a cryptographic writeaccess token in a user write set for each user authorized by thecustomer for write access to the corresponding document stored at thecloud storage system. The cryptographic read/write access tokens providethe cloud storage provider with evidence that a corresponding userlocally possesses the necessary keys for accessing the document, withoutrequiring the user to expose the keys to the cloud storage provider.Implementations further include recording a cryptographic word set tokenin a word set for each unique pair of words and documents where a wordappears in a corresponding document. Here, the cloud storage providerrequires users to provide evidence of having correct permissions toaccess any cryptographic word set tokens in the word set via theircryptographic read/write access tokens in the user read/write sets.Accordingly, the cloud storage provider is capable of offeringcryptographic guarantees on revoking/granting read/write access withoutthe ability to ever determine the values of any cryptographic tokensstored in the user read/write sets and the word sets.

Referring to FIG. 1.1 , in some implementations, a system 1100 includesone or more user devices 1110, 1110 a-n associated with one or moreusers 1010, 1010 a-n, who may communicate, via a network 1130, with aremote system 1140. The user devices 1110 may also communicate with oneanother via a secure and authenticated channel 1120 without revealingany data or private information to the distributed system 1140. Theremote system 1140 may be a distributed system (e.g., cloud environment)having scalable/elastic resources 1142. The resources 1142 includecomputing resources 1144 and/or storage resources 1146. In someimplementations, the remote system 1140 includes data storage 1150(e.g., a distributed storage system or a data store) configured to storeone or more documents 1200, 1200 a-n within memory hardware. The datastore 1150 stores encrypted documents 1200 that may be modified (e.g.,adding/deleting/editing) by users 1010 having write access and/orsearchable by users 1010 having read access. As used herein, a document1200 may refer to any encrypted item uploaded onto the remote system1140 for storage within the data store 1150, such as, withoutlimitation, emails, calendar events, notes, database entries, etc. Insome examples, the remote system 1140 executes a Searchable SymmetricEncryption (SSE) manager 1160 for managing access to the encrypteddocuments 1200 within the data storage 1150.

The user devices 1110 can be any computing devices that are capable ofcommunicating with the SSE manager 1160 through the network 1130 and/orwith one another through the secure and authenticated channel 1120. Inthe example shown, the user 1010 a is associated with a creator/sharorof one or more documents 1200 encrypted and stored in the data storage1150 and the user 1010 n may be associated with a sharee that thecreator/sharor 1010 shares at least one of write access or read accessto any of the encrypted documents 1200 stored in the data store 1150.Read access provides the sharee 1010 n with search functionality overeach document 1200 the sharee 1010 n has read access, while write accessprovides the sharee 1010 n with the ability to modify/edit the searchresults for each document 1200 the sharee 1010 n has write access. Users1010 without read/write access to encrypted documents 1200 are unable tolearn anything about those encrypted documents 1200. The creator/sharor1010 a has both read/write access to each document 1200 the sharor 1010a creates and stores in the data store 1150 of the remote system 1150.In some examples, the creator/sharor 1010 a revokes previously sharedread and/or write access for a document 1200 from a sharee 1010 n.

In some implementations, the data store 1150 stores a document recordset 1210, 1210 a-n for each encrypted document 1200. The creator 1010 ofeach document 1200 may generate a secure random document identifier d.Each document record set 1210 includes a user read set (UserRead) 1220,a user write set (UserWrite) 1230, and a document word set 1240. Theuser read set 1220 includes a set of user identifiers u₁, u₂, . . . ,u_(n) associated with users 1010 having (or not having) read access tothe corresponding document 1200 of the document record set 1210. Forinstance, location (u₁, d) 1212 and location (u_(n), d) 1212 of the userread set 1220 each include a corresponding read access token T_(R1),T_(Rn) 1222 authorizing read access to the users 1010 associated withuser identifiers u₁, u_(n) for the document 1200 associated with thedocument identifier d. Conversely, as location (u₂, d) 1212 of the userread set 1220 does not include a corresponding read access token T_(R)1222, the user 1010 associated with the user identifier u₂ does not haveread access for the document 1200. Specifically, the user 1010associated with the user identifier u₂ does not possess thecryptographic primitives required by the SSE Manager 1160 to authorizeread access for the document 1200.

The user write set 1230 includes a set of user identifiers u₁, u₂, . . ., u_(n) associated with users 1010 having (or not having) write accessto the corresponding document 1200 of the document record set 1210. Forinstance, location (u₁, d) 1212 of the user write set 1230 includes acorresponding write access token T_(W1) 1232 authorizing write access tothe user 1010 associated with the user identifier u₁ for the document1200 associated with the document identifier d. By contrast, location(u₂, d) 1212 and location (u_(n), d) 1212 of the user write set 1230 donot include corresponding write access tokens T_(W) 1232, and therefore,the users 1010 associated with user identifiers u₂, u_(n) do not havewrite access for the document 1200. Specifically, the users 1010associated with the user identifiers u₂, u_(n) do not possess thecryptographic primitives required by the SSE Manager 1160 to authorizewrite access for the document. Accordingly, the user 1010 associatedwith the user identifier u_(n) has read access for the document 1200(i.e., location (u_(n), d) 1212 of the user read set 1220 includes thecorresponding read access token T_(Rn) 1222), but does not have writeaccess for the document 1200 (i.e., location (u_(n), d) 1212 of the userwrite set 1230 does not include a corresponding write access token T_(W)1232.

The word set 1240 includes a set of words w₁, w₂, w₃, . . . , w_(n) eachappearing in the corresponding document 1200 associated with thedocument identifier d. For each unique word-document pair (w₁, d), (w₂,d), (w₃, d), . . . , (w_(n), d) in which a corresponding word w appearsin the document 1200 associated with the document identifier d, the wordset 1240 may record a corresponding cryptographic word token z_(d) (FIG.1.5A) and corresponding encrypted word metadata mw 1556 (FIG. 1.5B) forthe word w. The encrypted word metadata mw includes the encryption ofword metadata M_(d)(w) for the document d associated with the word w.The word metadata M_(d)(w) may include a ranking, extensions, snippets,etc. associated with the word w within the document 1200. A user 1010must have correct permissions to access any of the cryptographic wordtokens in the word set 1240. For instance, a user 1010 may use acorresponding read access token T_(R) to determine a value of acryptographic word token.

With continued reference to FIG. 1.1 , the user device 1110 a associatedwith the creator/sharor 1010 a may generate a cryptographic user keyK_(u) 1112 associated with the sharor 1010 a, a cryptographic read keyK_(d) ^(r) 202 for the document d 1200, a cryptographic write key K_(d)^(w) 204 for the document d 1200, and metadata M_(d) 1206 associatedwith the document d 1200. The M_(d) 1206 may include a title of thedocument 1200 and/or other information associated with the document. Theuser device 1110 a may compute encrypted metadata m_(d) 1256 associatedwith the document d 1200 by encrypting the M_(d) 1206 using the read keyK_(d) ^(r) 202. In some examples, the user device 1110 a generates aread access token T_(R) 1222 a associated with the creator/sharor 1010 alocally and sends the read access token T_(R) 1222 a to the SSE manager1160 for input to the user read set 1220. Similarly, the user device1110 a may generate a write access token T_(W) 1232 a associated withthe creator/sharor 1010 a locally and send the write access token T_(W)1232 a to the SSE manager 1160 for input to the user write set 1230.

The creator/sharor 1010 a may attain full control of the keys K_(u)1112, K_(d) ^(r) 202, K_(d) ^(w) 204 and keep the keys private/secretfrom the remote system 1140. For instance, the creator/sharor 1010 a mayprovide the SSE manager 1160 the read access token 1222 a to demonstratethat the sharor 1010 a locally possesses the user key K_(u) 1112 and theread key K_(d) ^(r) 202 for read access to the encrypted document 1200stored in the data store 1150. Similarly, the creator/sharor 1010 a mayprovide the SSE manager 1160 the write access token 1232 a todemonstrate that the sharor 1010 a locally possesses the user key K_(u)1112 and the write key K_(d) ^(w) 204 for write access to the encrypteddocument 1200 stored in the data store 1150. Accordingly, thecreator/sharor 1010 a does not have to provide any of the sensitive keysK_(u) 1112, K_(d) ^(r) 202, K_(d) ^(w) 204 to a service provider of thedata store 1150 when accessing encrypted documents 1200 stored therein.

Referring to FIG. 1.2A, a read access token 1222 includes acorresponding location (u, d) 1212 in the user read set 1220, acryptographic read access value 1224, and the encrypted metadata m_(d)1256. In some examples, a user 1010 possessing the write key K_(d) ^(w)204 and the encrypted metadata m_(d) 1256 may generate the read accesstoken 1222 locally and send the read access token 1222 to the SSEmanager 1160 for input to the user read set 1220 at the correspondinglocation (u, d) 1212. In other examples, when the user 1010 correspondsto a sharee possessing only the read key K_(d) ^(r) 202, the SSE manager1160 (e.g., data processing hardware) may generate the read access token1222 for the user 1010 and insert the read access token 1222 into theuser read set 1220 at the corresponding location (u, d) 1212. In theexample shown, the cryptographic read access value 1224 includes aquotient of a pseudorandom function F of the write key K_(d) ^(w) 204and the document identifier d divided by a pseudorandom function F ofthe user key K_(u) 1112 and the document identifier d. For instance, thecryptographic read access value 1224 may be calculated as follows.

$\begin{matrix}{{{Cryptographic}{Read}{Access}{Value}} = \frac{F\left( {K_{d}^{w},d} \right)}{F\left( {K_{u},d} \right)}} & (1)\end{matrix}$

Referring to FIG. 1.2B, a write access token 1232 includes acorresponding location (u, d) 1212 in the user write set 1230 and acryptographic write access value 1234. A user device 1110 associatedwith a user 1010 in possession of the write key K_(d) ^(w) 204 maygenerate the write access token 1232 for the user 1010 locally and sendthe write access token 1232 to the SSE manager 1160 for input to theuser write set 1230 at the corresponding location (u, d) 1212. In theexample shown, the cryptographic write access value 1234 includes aquotient of a pseudorandom function F of the write key K_(d) ^(w) 204and the document identifier d divided by a pseudorandom function F ofthe write key K_(d) ^(w) 204 and the user identifier u multiplied by apseudorandom function F of the user key K_(u) 1112 and the useridentifier u. For instance, the cryptographic write access value 1234may be calculated as follows.

$\begin{matrix}{{{Cryptographic}{Write}{Access}{Value}} = \frac{F\left( {K_{d}^{w},d} \right)}{{F\left( {K_{d}^{w},u} \right)}{F\left( {K_{u},u} \right)}}} & (2)\end{matrix}$

In some implementations, the creator/sharor 1010 a shares read access toat least one sharee 1010 n for a document 1200 stored in the data store1150 (e.g., memory hardware) by sending a shared read access command1250 over the network 1130 to the SSE manager 1160. The shared readaccess command 1250 includes the encrypted metadata m_(d) 1256 and afirst cryptographic share value S₁ 252 based on the read key K_(d) ^(r)202, the write key K_(d) ^(w) 204, the document identifier d, and auser/sharee identifier u_(n) identifying the sharee 1010 n. Thecreator/sharor 1010 a additionally provides the read key K_(d) ^(r) 202for the document 1200 to the at least one sharee 1010 n. In the exampleshown, the creator/sharor 1010 a provides the read key K_(d) ^(r) 202 bysending the read key K_(d) ^(r) 202 over the secure and authenticatedcommunication link 1120. Accordingly, the read key K_(d) ^(r) 202 iskept private from the remote system 1140 and only provided to users 1010having read access.

In order to attain read access to the document 1200, the user device1110 n associated with the sharee 1010 n sends a read access request1260 to the SSE Manager 1160. The read access request 1260 includes thesharee identifier u_(n), the document identifier d, and a secondcryptographic share value S₂ 262 based on the read key K_(d) ^(r) 202and a user key K_(un) 1112 associated with the sharee 1010 n. In someimplementations, the user device 1110 associated with the sharee 1010 ncomputes the second cryptographic share value S₂ 262 in response toreceiving the read key K_(d) ^(r) 202 from the sharor 1010 a. The SSEmanager 1160 computes a corresponding read access token T_(Rn) 1222 forthe sharee 1010 n using the first cryptographic share value S₁ 252received from the sharor 1010 n in the shared read access command 1250and the second cryptographic share value S₂ 262 received from the sharee1010 a. Thereafter, the SSE manager 1160 stores/records the read accesstoken T_(Rn) 1222 for the sharee 1010 n in the user read set 1220 at thelocation 1212 (u_(n), d).

In some implementations, the sharor 1010 a shares write access to atleast one sharee 1010 n for the document 1200 in the data store 1150 bysending shared write access permissions 1402 (FIG. 1.4A) to the sharee1010 n over the secure and authenticated communication link 1120. In theexample shown, the shared write access permissions include the read keyK_(d) ^(r) 202, the write key K_(d) ^(w) 204, and the encrypted metadatam_(d) 1256. In response to receiving the shared write access permissions1402, the sharee 1010 n computes a corresponding write access tokenT_(W) 1232 for the sharee 1010 n and sends the write access token T_(W)1232 to the SSE manager 1160 for input to the user write set 1230 at thecorresponding location 1212 (u_(n), d). As write access implies readaccess, the sharee 1010 n further computes the corresponding read accesstoken T_(R) 1222 for the sharee 1010 n and sends the read access tokenT_(R) 1222 to the SSE manager 1160 for input to the user read set 1220at the corresponding location 1212 (u_(n), d).

FIGS. 1.3A and 1.3B show schematic views 1300 a, 1300 b of an exampleSSE manager 1160 authorizing/revoking read access for a document 1200to/from a sharee 1010 b. Referring to FIG. 1.3A, the SSE manager 1160receives the shared read access command 1250 from the sharor 1010 asharing read access to the sharee 1010 b for the document 1200 stored inthe data store 1150 (e.g., memory hardware). The shared access readcommand 1250 includes the first cryptographic share value S₁ 252 and theencrypted metadata m_(d) 1256 associated with the document 1200. In theexample shown, the first cryptographic share value S₁ 252 includes aquotient of a pseudorandom function F of the write key K_(d) ^(w) 204and the document identifier d divided by a pseudorandom function F ofthe read key K_(d) ^(r) 202 and the user/sharee identifier u₂identifying the sharee 1010 b. For instance the first cryptographicshare value S₁ 252 may be calculated as follows.

$\begin{matrix}{S_{1} = \frac{F\left( {K_{d}^{w},d} \right)}{F\left( {K_{d}^{r},u_{2}} \right)}} & (3)\end{matrix}$

In response to receiving the read key K_(d) ^(r) 202 from the sharor1010 a, the sharee 1010 b computes the second cryptographic share valueS₂ 262 based on the read key K_(d) ^(r) 202 and a user key K_(u2) 1112associated with the sharee 1010 b. In the example shown, the secondcryptographic share value S₂ 262 includes a quotient of a pseudorandomfunction F of the read key K_(d) ^(r) 202 and the user identifier u₂identifying the sharee 1010 b divided by a pseudorandom function F ofthe user key K_(u2) 1112 and the document identifier d identifying thedocument 1200. For instance the second cryptographic share value S₂ 262may be calculated as follows.

$\begin{matrix}{S_{2} = \frac{F\left( {K_{d}^{r},u_{2}} \right)}{F\left( {K_{u2},d} \right)}} & (4)\end{matrix}$

The SSE manager 1160 also receives the read access request 1260 from thesharee 1010 b that includes the second cryptographic share value S₂ 262and the location 1212 associated with the user identifier u₂ and thedocument identifier d. In some implementations, the SSE manager 1160determines the cryptographic read access value 1224 for the sharee 1010b based on the first and second cryptographic share values S₁, S₂ 252,262 received from the corresponding one of the sharor 1010 a or thesharee 1010 b. The cryptographic read access value 1224 authorizes readaccess to the sharee 1010 b for the document 1200. In some examples, theSSE manager 1160 determines the cryptographic read access value 1224 forthe sharee 1010 b by multiplying the first cryptographic share value S₁252 and the second cryptographic share value S₂ 262. Thereafter, the SSEmanager 1160 stores/records a read access token T_(R2) 1222 for thesharee 1010 b in the user read set 1220 at the location 1212 (u₂, d).The read access token T_(R2) 1222 includes the computed cryptographicread access value 1224 and the encrypted metadata m_(d) 1256.

Referring to FIG. 1.3B, the SSE manager 1160 receives a revoke readaccess command 1350 from the sharor 1010 a revoking read access from thesharee 1010 b for the document 1200 stored in the data store 1150. Inthe example shown, the sharor 1010 a corresponds to a creator of thedocument 1200 and is the only individual permitted to revoke read access(and also write access) from any sharees 1010 having read accesspermissions. In other configurations, the sharor 1010 a may correspondto a writer of the document 1200 having the ability to share/revoke readaccess for the document 1200 to/from sharees 1010. The revoke readaccess command 1350 may identify the location 1212 (u₂, d) that includesthe read access entry (e.g., read access token 1222) to be removed fromthe corresponding sharee 1010 b in the user read set 1220. In responseto receiving the revoke read access command 1350, the SSE manager 1160may send a revoke read access input 1352 (e.g., “Delete Entry”) to thedata record set 1210 to remove the read access token T_(R2) 1222 fromthe user read set 1220. Accordingly, with the token T_(R2) 1222 removedfrom the location 1212 (u₂, d) in the user read set 1220, the sharee1010 b no longer has read access permissions to the document 1200.

In some examples, the SSE manager 1160 also determines whether acorresponding write access token T_(W2) 1232 exists for the sharee 1010b at the location 1212 (u₂, d) in the user write set 1230, and when thewrite access token T_(W2) 1232 exists, the SSE manager 1160 also removesthe write access token T_(W2) 1232 from the user write set 1230. Forinstance, the SSE manager 1160 may send a revoke write access input 1452(FIG. 1.4B) to the data record set 1210 to remove the write access tokenT_(R2) 1222 from the user write set 1230.

FIGS. 1.4A and 1.4B show schematic views 1400 a, 1400 b of an exampleSSE manager 1160 authorizing/revoking write access for a document 1200to/from a sharee 1010 b. Referring to FIG. 1.4A, the sharee 1010 b(i.e., via the user device 1110 b (FIG. 1.1 )) receives the write accesspermissions 1402 from the sharor 1010 a sharing write access to thesharee 1010 b for the document 1200 stored in the data store 1160. Thesharee 1010 b may receive the write access permissions 1402 over thesecure and authenticated communication link 1120. The shared writeaccess permissions 1402 include the read key K_(d) ^(r) 202, the writekey K_(d) ^(w) 204, and the encrypted metadata m_(d) 1256.

Using the write access permissions 1402, the sharee 1010 b computes botha read access token T_(R2) 1222 for the sharee 1010 b and a write accesstoken T_(W2) 1232 for the sharee 1010 b since having write accesspermissions also includes read access permissions. For instance, thesharee 1010 b may compute the cryptographic read access value 1224 usingEquation 1 and send the read access token T_(R2) 1222 including thecryptographic read access value 1224 and the encrypted metadata m_(d)1256 to the SSE manager 1160. Similarly, the sharee 1010 b may computethe cryptographic write access value 1234 using Equation 2 and send thewrite access token T_(W2) 1232 including the cryptographic write accessvalue 1234 to the SSE manager 1160. The sharee 1010 b may send thetokens 1222, 1232 to the SSE manager separately or simultaneously.

In the example shown, the SSE manager 1160 stores/records the writeaccess token T_(W2) 1232 for the sharee 1010 b in the user write set1230 at the location 1212 (u₂, d) in response to receiving the writeaccess token T_(W2) 1232 from the sharee 1010 b. Accordingly, the entryof the write access token T_(W2) 1232 in the user write set 1230 at thelocation 1212 (u₂, d) authorizes write access to the sharee 1010 b forediting (e.g., delete/overwrite/add) the document 1200 stored in thedata store 1160 without providing any private keys to the remote system1140.

SSE manager 1160 also stores/records the read access token T_(R2) 1222for the sharee 1010 b in the user read set 1220 at the location 1212(u₂, d) in response to receiving the read access token T_(R2) 1222 fromthe sharee 1010 b. Accordingly, the entry of the read access tokenT_(R2) 1222 in the user read set 1220 at the location 1212 (u₂, d)authorizes read access to the sharee 1010 b for the document 1200 storedin the data store 1160 without providing any private keys to the remotesystem 1140.

Referring to FIG. 1.4B, the SSE manager 1160 receives a revoke writeaccess command 1450 from the sharor 1010 a revoking write access fromthe sharee 1010 b for the document 1200 stored in the data store 1150.In the example shown, the sharor 1010 a corresponds to a creator of thedocument 1200 and is the only individual permitted to revoke writeaccess (and also read access) from any sharees 1010 having write accesspermissions. In other configurations, the sharor 1010 a may correspondto a writer of the document 1200 having the ability to share/revokewrite access for the document 1200 to/from sharees 1010. The revokewrite access command 1450 may identify the location 1212 (u₂, d) thatincludes the write access entry (e.g., write access token 1232) to berevoked from the corresponding sharee 1010 b in the user write set 1230.In response to receiving the revoke write access command 1450, the SSEmanager 1160 may send the revoke write access input 1452 (e.g., “DeleteEntry”) to the data record set 1210 to remove the write access tokenT_(W2) 1232 from the user write set 1230. Accordingly, with the tokenT_(W2) 1232 removed from the location 1212 (u₂, d) in the user write set1230, the sharee 1010 b no longer has write access permissions to thedocument 1200. In the example of FIG. 1.4B, the read access token T_(R2)1222 will remain as a valid entry in the user read set 1220 at location1212 (u₂, d) unless the SSE manager 1160 receives a revoke read accesscommand 1350 (FIG. 1.3B) from the sharor 1010 b. Document owners 1010may assume the role of the SSE manager 1160 for granting/revokingaccess.

FIGS. 1.5A and 1.5B show schematic views 1500 a, 1500 b of an exampleuser 1010, via the user device 1110, sending a search query 1550 to theSSE manager 1160 for a keyword w in an encrypted document 1200 stored inthe data store 1150. The SSE manager 1160 may correspond to an owner ofthe document in some scenarios. In the example shown, the user 1010 hasread access to the encrypted document 1200 and may correspond to acreator 1010 a of the document 1200 or a sharee 1010 a having sharedread access for the document 1200. In the example shown, the searchquery 1550 includes the user identifier u, the document identifier d,and a cryptographic search value x_(d) 1552 based on the read key K_(d)^(r) 202 and the user key K_(u) 1112 associated with the user 1010. Insome implementations, the cryptographic search value x_(d) 1552 includesa generator g to the power of a pseudorandom function F of the read keyK_(d) ^(r) 202 and the keyword w multiplied by a pseudorandom function Fof the user key K_(u) 1112 and the document identifier d identifying thedocument 1200. For instance, the cryptographic search value x_(d) 1552may be calculated as follows.

x _(d) =g ^(F(K) ^(d) ^(r) ^(,w)F(K) ^(u) ^(,d))  (5)

In some examples, the generator g corresponds to a group whereDiffie-Hellman is hard. The cryptographic search value x_(d) 1552 allowsthe SSE manager 1160 to determine that the user 1010 has access to boththe cryptographic read key K_(d) ^(r) 202 and the cryptographic user keyK_(u) 1112 without requiring the user 1010 to provide either of the keys1112, 202 to the SSE manager 1160.

In some implementations, the user 1010 sends the search query 1550 forthe keyword w over a set of documents U_(r)(u) 1200 the user 1010 hasread access. Accordingly, the user 1010 may compute x_(d), x_(d1), . . ., x_(dn) using Equation (5) for each corresponding document 1200 amongthe set of documents U_(r)(u) 1200 and include each value of x_(d),x_(d1), . . . , x_(dn) and each corresponding document identifier d, d₁,. . . , d_(n) in the search query 1550 sent to the SSE manager 1160. Theuser device 1110 associated with the user 1010 may keep track of eachdocument 1200 that the user 1010 has read access permission and includethose documents 1200 within the set of documents U_(r)(u) 1200.

In response to receiving the search query 1550 from the user 1010, theSSE manager 1160 queries 1560 the document record set 1210 to retrievethe read access token T_(R) 1222 for the user 1010 from the user readset 1220 of the document record set 1210 at the location 1212 (u, d).The SSE manager 1160 may query 1560 each document record set 1210, 1210a-n when the received search query 1550 from the user 1010 is associatedwith the set of documents U_(r)(u) 1200. The read access token T_(R)1222 retrieved by the SSE manager 1160 from the user read set 1220includes a corresponding cryptographic read access value y_(d) 1224 andthe encrypted metadata m_(d) 1256.

Referring to FIG. 1.5B, in some implementations, the SSE manager 1160(e.g., data processing hardware) computes a cryptographic word set tokenz_(d) based on the cryptographic search value x_(d) 1552 received fromthe user 1010 in the search query 1550 and the cryptographic read accessvalue y_(d) 1224 of the read access token T_(R) 1222 retrieved from theuser read set 1220. For instance, the SSE manager 1160 may compute thecryptographic word set token z_(d) as follows.

z _(d) =x _(d) ^(y) ^(d)   (6)

Thereafter, the SSE manager 1160 determines whether or not the computedcryptographic word set token z_(d) matches at least one correspondingcryptographic word set token z_(d) recorded/stored in the word set 1240for the corresponding document 1200. Here, the SSE manager 1160 isdetermining whether or not the recently computed token z_(d) appears inthe word set 1240 associated with the corresponding document 1200. Inthe example shown, the SSE manager 1160 queries 1570 the word set 1240using the cryptographic word set token z_(d). When the query 1570identifies the corresponding cryptographic word set token z_(d), the SSEmanager 1160 retrieves the corresponding encrypted word metadata m_(w)1556 for the word w at the location (w, d) in the word set 1240associated with the matching token z_(d).

In some implementations, the SSE manager 1160 returns a result set 1580including the document identifier d identifying the correspondingdocument 1200, the encrypted metadata m_(d) 1256 for the document 1200,and the encrypted word metadata m_(w) 1556. The SSE manager 1160 mayreturn a corresponding result set 1580 for each document the user 1010has read access to. Using the read key K_(d) ^(r) 202, the user 1010(i.e., via the user device 1110) may decrypt the encrypted metadatam_(d) 1256 to provide the metadata M_(d) and decrypt the encrypted wordmetadata to provide the word metadata M_(d)(w) for the document dassociated with the word w. In some examples, the user device 1110 usesthe metadata M_(d) and the word metadata M_(d)(w) for the document dassociated with the word w to sort and display search results on adisplay of the user device 1110. For instance, the word metadataM_(d)(w) may include snippets, rankings, extensions, etc. that may beused to sort the search results on the display of the user device 1110.FIG. 1.5C provides an example algorithm for a user 1010 performing asearch for a keyword w over a set of documents Ur(u) 1200 that the userhas read access.

FIGS. 1.6A and 1.6B show schematic views 1600 a, 1600 b of an exampleuser 1010, via the user device 1110, sending an edit operation request1650 to the SSE manager 1160 to edit a word w within an encrypteddocument 1200 stored in the data store 1150. The SSE manager 1160 maycorrespond to an owner of the document in some scenarios. In the exampleshown, the user 1010 has write access permission to the encrypteddocument 1200 and may correspond to a creator 1010 a of the document1200 or a sharee 1010 n having shared write access for the document1200. An edit operation 1654 requested by the edit operation request1650 may include one of a delete, overwrite, or add operation on thekeyword w in the document 1200. In the example shown, the user 1010creates word metadata M_(d)(w) for the document d associated with theword identifier w identifying the word to be edited. The word metadataM_(d)(w) may include a ranking, extensions, snippets, etc. associatedwith the word identifier w identifying the word within the document 1200to be edited. The user may encrypt the word metadata M_(d)(w) using readkey K_(d) ^(r) 202 to provide word metadata m_(w) 1556. In someimplementations, the user 1010, via the user device 1110 computes acryptographic edit value x 1652 based on the read key K_(d) ^(r) 202,the write key K_(d) ^(w) 204, and the user key K_(u) 1112 associatedwith the user 1010.

In the example shown, the edit operation request 1650 includes the useridentifier u, the document identifier d, the edit operation 1654,encrypted word metadata mw 1556, and a cryptographic edit value x 1652based on the read key K_(d) ^(r) 202, the write key K_(d) ^(w) 204, theuser key K_(u) 1112, the word identifier w, and the user identifier uidentifying the user 1010. In some implementations, the cryptographicedit value x 1652 includes a generator g to the power of a pseudorandomfunction F of the read key K_(d) ^(r) 202 and the keyword w multipliedby a pseudorandom function F of the user key K_(u) 1112 and the useridentifier u multiplied by a pseudorandom function F of the write keyK_(d) ^(w) 204 and the user identifier u. For instance, thecryptographic edit value x 1652 may be calculated as follows.

x=g ^(F(K) ^(d) ^(r) ^(,w)F(K) ^(u) ^(,u)F(K) ^(d) ^(w) ^(,u))  (7)

In some examples, the generator g corresponds to a group whereDiffie-Hellman is hard. The cryptographic edit value x 1652 allows theSSE manager 1160 to determine that the user 1010 has access to thecryptographic read key K_(d) ^(r) 202, the cryptographic write key K_(d)^(w) 204, and the cryptographic user key K_(u) 1112 without requiringthe user 1010 to provide any of the keys 1112, 202, 204 to the SSEmanager 1160.

In response to receiving the edit operation request 1650 from the user1010, the SSE manager 1160 queries 1660 the document record set 1210 toretrieve the write access token T_(W) 1232 for the user 1010 from theuser write set 1230 at the location 1212 (u, d). The write access tokenT_(W) 1222 retrieved by the SSE manager 1160 from the user write set1230 includes a corresponding cryptographic write access value y 1234.

Referring to FIG. 1.6B, in some implementations, the SSE manager 1160(e.g., data processing hardware) computes a cryptographic word set tokenz based on the cryptographic edit value x 1652 received from the user1010 in the edit operation request 1650 and the cryptographic writeaccess value y 1234 of the write access token T_(W) 1232 retrieved fromthe user write set 1230. For instance, the SSE manager 1160 may computethe cryptographic word set token z as follows.

z=x ^(y)  (7)

Thereafter, the SSE manager 1160 processes 1670 the edit operation 1654requested by the edit operation request 1650 on a correspondingcryptographic word set token z recorded/stored in the word set 1240 forthe corresponding document 1200. For instance, when the edit operation1654 includes a delete operation, the SSE manager 1160 may process thedelete operation by deleting/removing the corresponding cryptographicword set token z from the word set 1240. In some examples, when the editoperation 1654 includes an overwrite operation, the SSE manager 1160processes 1670 the overwrite operation by replacing the correspondingcryptographic word set token z in the word set 1240 with the computedcryptographic word set token z and the encrypted word metadata m_(d)1556. In yet another example, when the edit operation 1654 includes anadd operation (e.g., when z does not exist in the word set 1240), theSSE manager 1160 processes the add operation by adding the computedcryptographic word set token z and the encrypted word metadata m_(w)1556 into the word set 1240 at the location (w, d). FIG. 1.6C providesan example algorithm for a user 1010 performing a search for a keyword wover a set of documents Ur(u) 1200 that the user has read access.

FIG. 1.7 is a flowchart of an example method 1700 of a sharor 1010 asharing read access to a sharee 1010 b for a document 1200 stored in adata store 1150. The flowchart starts at operation 1702 when the SSEmanager 1160 (e.g., data processing hardware) receives a shared readaccess command 1250 from the sharor 1010 a. The shared read accesscommand 1250 includes first cryptographic share value S₁ 252 and theencrypted metadata m_(d) 1256 associated with the document 1200. Thefirst cryptographic share value S₁ 252 may be based on a write key K_(d)^(w) 204 for the document, a read key K_(d) ^(r) 202, a documentidentifier d identifying the document, and a sharee identifier u₂identifying the sharee 1010 b. For instance, the first cryptographicshare value S₁ 252 may be calculated using Equation (3).

At operation 1704, the method 1700 includes the SSE manager 1160receiving a shared read access request 1260 from the sharee 1010 b thatincludes a second cryptographic share value S₂ 262 and a location 1212associated with the sharee identifier u₂ and the document identifier d.In some examples, the sharee 1010 b computes the second cryptographicshare value S₂ 262 based on the read key K_(d) ^(r) 202 and a user keyK_(u2) 1112 associated with the sharee 1010 b. For instance, the secondcryptographic share value S₂ 262 may be calculated using Equation (4).

At operation 1706, the method 1700 includes the SSE manager 1160determining a cryptographic read access value 1224 for the sharee 1010 bbased on the first cryptographic share value S₁ 252 and the secondcryptographic share value S₂ 262. For instance, the SSE manager 1160 maymultiply the first cryptographic share value S₁ 252 received in theshared read access command 1250 from the sharor 1010 a by the secondcryptographic share value S₂ 262 received in the shared read accessrequest 1260 from the sharee 1010 b to determine the cryptographic readaccess value 1224 for the sharee 1010 b. The cryptographic read accessvalue 1224 may be used by the SSE manager 1160 to authorize read accessto the sharee 1010 b for the document 1200 stored in the memoryhardware.

At operation 1708, the method includes the SSE manager 1160 storing aread access token 1222 including the cryptographic read access value1224 and the encrypted metadata m_(d) 1256 in a user read set 1220 ofthe memory hardware. The user read set 1220 includes a list of shareeidentifiers u₁-u_(n) associated with sharees having read access to thedocument 1200.

FIG. 1.8 is a flowchart of an example method 1800 of a sharor 1010 asharing write access to a sharee 1010 b for a document 1200 stored on adistributed storage system 1150. The flowchart starts at operation 1802when a sharee device 1110 associated with the sharee 1010 b receivesshared write access permissions 1402 from a sharor 1010 b sharing writeaccess to the sharee 1010 b for the document stored on the distributedstorage system. The write access permissions 1402 include a read keyK_(d) ^(r) 202 for the document 1200, a write key K_(d) ^(w) 204 for thedocument 1200, and encrypted metadata m_(d) 1256 for the document 1200.The sharee device 1110 may receive the write access permissions 1402from the sharor 1010 a over a secure and authenticated communicationchannel.

At operation 1804, the method 1800 includes the sharee device 1110determining a cryptographic write access value 1234 based on the writekey K_(d) ^(w) 204, a document identifier d identifying the document1200, a sharee identifier u identifying the sharee 1010 b, and a shareecryptographic key K_(U) 1112 associated with the sharee 1010 b. Thecryptographic write access value 1234 may be calculated using Equation(2). The cryptographic write access value 1234 authorizes write accessto the sharee 1010 b for the document 1200.

At operation 1804, the method 1800 includes sending a write access token1232 for the sharee 1010 b that includes the cryptographic write accessvalue 1234 to the distributed storage system 1150. In response toreceiving the write access token 1232, the distributed storage system1150 is configured to store the write access token in a user write set1230. The user write set 1230 includes a list of sharee identifiersassociated with sharees 1010 having write access to the document 1200.

As write access implies read access, the method 1800 may further includethe sharee device 1110 determining a cryptographic read access value1224 based on the write key K_(d) ^(w) 204, the document identifier d,and the sharee cryptographic key K_(U) 1112. The cryptographic readaccess value 1224 may be calculated using Equation (1). Thecryptographic read access value authorizes read access to the sharee1010 b for the document 1200. The method 1800 may further include thesharee device 1110 sending a read access token 1222 for the sharee 1010b to the distributed storage system 1150. The read access token 1222 mayinclude the cryptographic read access value 1224 and the encryptedmetadata m_(d) 1256.

A software application (i.e., a software resource) may refer to computersoftware that causes a computing device to perform a task. In someexamples, a software application may be referred to as an “application,”an “app,” or a “program.” Example applications include, but are notlimited to, system diagnostic applications, system managementapplications, system maintenance applications, word processingapplications, spreadsheet applications, messaging applications, mediastreaming applications, social networking applications, and gamingapplications.

The non-transitory memory may be physical devices used to store programs(e.g., sequences of instructions) or data (e.g., program stateinformation) on a temporary or permanent basis for use by a computingdevice. The non-transitory memory may be volatile and/or non-volatileaddressable semiconductor memory. Examples of non-volatile memoryinclude, but are not limited to, flash memory and read-only memory(ROM)/programmable read-only memory (PROM)/erasable programmableread-only memory (EPROM)/electronically erasable programmable read-onlymemory (EEPROM) (e.g., typically used for firmware, such as bootprograms). Examples of volatile memory include, but are not limited to,random access memory (RAM), dynamic random access memory (DRAM), staticrandom access memory (SRAM), phase change memory (PCM) as well as disksor tapes.

FIG. 1.9 is schematic view of an example computing device 1900 that maybe used to implement the systems and methods described in this document.The computing device 1900 is intended to represent various forms ofdigital computers, such as laptops, desktops, workstations, personaldigital assistants, servers, blade servers, mainframes, and otherappropriate computers. The components shown here, their connections andrelationships, and their functions, are meant to be exemplary only, andare not meant to limit the various implementations described and/orclaimed in this document.

The computing device 1900 includes a processor 1910, memory 1920, astorage device 1930, a high-speed interface/controller 1940 connectingto the memory 1920 and high-speed expansion ports 1950, and a low speedinterface/controller 1960 connecting to low speed bus 1970 and storagedevice 1930. Each of the components 1910, 1920, 1930, 1940, 1950, and1960, are interconnected using various busses, and may be mounted on acommon motherboard or in other manners as appropriate. The processor1910 can process instructions for execution within the computing device1900, including instructions stored in the memory 1920 or on the storagedevice 1930 to display graphical information for a graphical userinterface (GUI) on an external input/output device, such as display 1980coupled to high speed interface 1940. In other implementations, multipleprocessors and/or multiple buses may be used, as appropriate, along withmultiple memories and types of memory. Also, multiple computing devices1900 may be connected, with each device providing portions of thenecessary operations (e.g., as a server bank, a group of blade servers,or a multi-processor system).

The memory 1920 stores information non-transitorily within the computingdevice 1900. The memory 1920 may be a computer-readable medium, avolatile memory unit(s), or non-volatile memory unit(s). Thenon-transitory memory 1920 may be physical devices used to storeprograms (e.g., sequences of instructions) or data (e.g., program stateinformation) on a temporary or permanent basis for use by the computingdevice 1900. Examples of non-volatile memory include, but are notlimited to, flash memory and read-only memory (ROM)/programmableread-only memory (PROM)/erasable programmable read-only memory(EPROM)/electronically erasable programmable read-only memory (EEPROM)(e.g., typically used for firmware, such as boot programs). Examples ofvolatile memory include, but are not limited to, random access memory(RAM), dynamic random access memory (DRAM), static random access memory(SRAM), phase change memory (PCM) as well as disks or tapes.

The storage device 1930 is capable of providing mass storage for thecomputing device 1900. In some implementations, the storage device 1930is a computer-readable medium. In various different implementations, thestorage device 1930 may be a floppy disk device, a hard disk device, anoptical disk device, or a tape device, a flash memory or other similarsolid state memory device, or an array of devices, including devices ina storage area network or other configurations. In additionalimplementations, a computer program product is tangibly embodied in aninformation carrier. The computer program product contains instructionsthat, when executed, perform one or more methods, such as thosedescribed above. The information carrier is a computer- ormachine-readable medium, such as the memory 1920, the storage device1930, or memory on processor 1910.

The high speed controller 1940 manages bandwidth-intensive operationsfor the computing device 1900, while the low speed controller 1960manages lower bandwidth-intensive operations. Such allocation of dutiesis exemplary only. In some implementations, the high-speed controller1940 is coupled to the memory 1920, the display 1980 (e.g., through agraphics processor or accelerator), and to the high-speed expansionports 1950, which may accept various expansion cards (not shown). Insome implementations, the low-speed controller 1960 is coupled to thestorage device 1930 and low-speed expansion port 1970. The low-speedexpansion port 1970, which may include various communication ports(e.g., USB, Bluetooth, Ethernet, wireless Ethernet), may be coupled toone or more input/output devices, such as a keyboard, a pointing device,a scanner, or a networking device such as a switch or router, e.g.,through a network adapter.

The computing device 1900 may be implemented in a number of differentforms, as shown in the figure. For example, it may be implemented as astandard server 1900 a or multiple times in a group of such servers 1900a, as a laptop computer 1900 b, or as part of a rack server system 1900c. In some implementations, the computing device 1900 implements the SSEmanager 1160.

SECTION 2: Efficient Oblivious Permutation

Implementations herein are directed toward using oblivious random accessmemory (O-RAM) to conceal client access patterns to client-owned andclient-encrypted data stored on untrusted memory. The untrusted memorymay include a storage abstraction overlaid across multiple memorylocations of a distributed system. The untrusted memory may be dividedinto multiple buckets each containing an equal number of data blocks andthe client may iteratively download one bucket at a time from theuntrusted memory and apply a random permutation on the data blocksresiding in the downloaded bucket. The random permutation may assigneach of the data blocks from the downloaded bucket a new memory locationon the untrusted memory that is oblivious to a service provider of theuntrusted memory (e.g., a cloud service provider). Moreover, the clientmay further decrypt and encrypt the data blocks locally usingclient-side keys without giving the service provider plain text accessto the data. Implementations further include initializing cache slots inlocal memory at the client for storing the permutated data blocks beforeuploading the data blocks to their new memory locations. Each cache slotmay serve as an extension to the new memory locations of the untrustedmemory, and therefore reduce a level of overhead and bandwidth requiredfor uploading permutated data blocks from the client to the untrustedmemory.

FIG. 2.1 depicts an example system 2100 for storing data blocks 2102owned by a client 2104 on a distributed system 2140 and obliviouslymoving the data blocks 2102 around the distributed system 2140 toconceal access patterns while preserving search functionalities on thedata blocks 2102 by the client 2104. A client device 2120 (e.g., acomputer) associated with the client 2104 communicates, via a network2130, with the distributed system 2140 having a scalable/elasticnon-transitory storage abstraction 2150. The client device 2120 mayinclude associated memory hardware 2122. The storage abstraction 2150(e.g., key/value store, file system, data store, etc.) is overlain onthe storage resources 2114 to allow scalable use of the storageresources 2114 by one or more client devices 2120.

In some implementations, the distributed system 2140 executes acomputing device 2112 that manages access to the storage abstraction2150. For instance, the client device 2120 may encrypt and store thedata blocks 2102 on the storage abstraction 2150, as well as retrieveand decrypt the data blocks 2102 from the storage abstraction 2150.While the example shown depicts the system 2100 having a trusted sideassociated with the client device 2120 in communication, via the network2130, with an untrusted side associated with the distributed system2140, the system 2100 may be alternatively implemented on a largeintranet having a trusted computing device(s) (CPU) and untrusted datastorage.

In some implementations, the distributed system 2100 includes resources2110, 2110 a-z. The resources 2110 may include hardware resources 2110and software resources 2110. The hardware resources 2110 may includecomputing devices 2112 (also referred to as data processing devices anddata processing hardware) or non-transitory memory 2114 (also referredto as memory hardware). The software resources 2110 may include softwareapplications, software services, application programming interfaces(APIs) or the like. The software resources 2110 may reside in thehardware resources 2110. For example, the software resources 2110 may bestored in the memory hardware 2114 or the hardware resources 2110 (e.g.,the computing devices 2112) may be executing the software resources2110.

A software application (i.e., a software resource 2110) may refer tocomputer software that causes a computing device to perform a task. Insome examples, a software application may be referred to as an“application,” an “app,” or a “program.” Example applications include,but are not limited to, system diagnostic applications, systemmanagement applications, system maintenance applications, wordprocessing applications, spreadsheet applications, messagingapplications, media streaming applications, social networkingapplications, and gaming applications.

The memory hardware 2114, 2122 may be physical devices used to storeprograms (e.g., sequences of instructions) or data (e.g., program stateinformation) on a temporary or permanent basis for use by a computingdevice 2112 and/or a client device 2120. The memory hardware 2114, 2122may be volatile and/or non-volatile addressable semiconductor memory.Examples of non-volatile memory include, but are not limited to, flashmemory and read-only memory (ROM)/programmable read-only memory(PROM)/erasable programmable read-only memory (EPROM)/electronicallyerasable programmable read-only memory (EEPROM) (e.g., typically usedfor firmware, such as boot programs). Examples of volatile memoryinclude, but are not limited to, random access memory (RAM), obliviousrandom access memory (ORAM), dynamic random access memory (DRAM), staticrandom access memory (SRAM), phase change memory (PCM) as well as disksor tapes.

The network 2130 may include various types of networks, such as localarea network (LAN), wide area network (WAN), and/or the Internet.Although the network 2130 may represent a long range network (e.g.,Internet or WAN), in some implementations, the network 2130 includes ashorter range network, such as a local area network (LAN). In someimplementations, the network 2130 uses standard communicationstechnologies and/or protocols. Thus, the network 2130 can include linksusing technologies, such as Ethernet, Wireless Fidelity (WiFi) (e.g.,802.11), worldwide interoperability for microwave access (WiMAX), 3G,Long Term Evolution (LTE), digital subscriber line (DSL), asynchronoustransfer mode (ATM), InfiniBand, PCI Express Advanced Switching,Bluetooth, Bluetooth Low Energy (BLE), etc. Similarly, the networkingprotocols used on the network 2132 can include multiprotocol labelswitching (MPLS), the transmission control protocol/Internet protocol(TCP/IP), the User Datagram Protocol (UDP), the hypertext transportprotocol (HTTP), the simple mail transfer protocol (SMTP), the filetransfer protocol (FTP), etc. The data exchanged over the network 2130can be represented using technologies and/or formats including thehypertext markup language (HTML), the extensible markup language (XML),etc. In addition, all or some of the links can be encrypted usingconventional encryption technologies, such as secure sockets layer(SSL), transport layer security (TLS), virtual private networks (VPNs),Internet Protocol security (IPsec), etc. In other examples, the network2130 uses custom and/or dedicated data communications technologiesinstead of, or in addition to, the ones described above.

The data blocks 2102 correspond to atomic units of data and each havesize B bytes each. For example, a typical value for B for storage on adistributed system may be 64 KB to 256 B. A notation N denotes a totalnumber of the data blocks 2102 associated with the client 2104 andstored on the storage abstraction 2150 using Oblivious Random AccessMemory (O-RAM). Thus, N may refer to the capacity of the O-RAM on thestorage abstraction 2150. Each of the N data blocks 2102 is stored at acorresponding memory location 2118, 2118A-N (FIG. 2.2 ) of the storageabstraction 2150 overlain across the memory hardware 2114.

While traditional encryption schemes provide confidentiality, thetraditional encryption schemes are ineffective at hiding data accesspatterns which may reveal very sensitive information to the untrusteddistributed system 2140. Moreover, the traditional encryption schemesallow the client 2104 to search for encrypted data 2102 stored on thedistributed system 2140 only if the client 2104 provides plain textaccess for the data 2102 to the distributed system 2140. As the clientdevice 2120 originates the data 2102, the client device 2120 isconsidered trusted. In some implementations, the client device 2120 andthe distributed system 2140 execute an oblivious permutation routine2300 for oblivious moving the encrypted data blocks 2102 around thestorage abstraction 2150 to completely hide data access patterns (whichdata blocks 2102 were read/written) from the distributed system 2140.

Execution of the oblivious permutation routine 2300 requires (4+ε)Nblock accesses while only requiring O(√{square root over (N)}) storagecapacity at the client memory 2122. The routine 2300 may achieve abandwidth of about 2.2N to provide an amortized cost equal to about2.2√{square root over (N)} accesses (e.g., a read access or a writeaccess) to the data stored on the storage abstraction 2150.

At the untrusted side, the distributed system 2140 may receive anoblivious permutation request 2302 from the trusted client device 2120to initiate the oblivious permutation routine 2300. For instance, theoblivious permutation routine 2300 may cause the distributed system 2140to allocate new memory locations 2118 of the storage abstraction 2150for storing re-permutated data blocks 2102 and organize/divide/partitionthe storage abstraction 2150 into multiple data buckets 2350, 2350 a-n.In some implementations, the oblivious permutation routine 2300organizes the storage abstraction 2150 into n data buckets 2350 eachcontaining n data blocks 2102, whereby the value n is equal to thesquare root of the N data blocks 2102 (i.e., n=√{square root over (N)}).For instance, the routine may organize the storage abstraction 2150 bydividing the memory locations 2118 into the substantially n data buckets2350 each containing substantially n data blocks 2102. In some examples,the n data blocks 2102 are randomly assigned to each data bucket 2350 bypermutations performed at the client device 2120 during a previousoblivious permutation routine 2300. Accordingly, the division of thestorage abstraction 2150 into the n data buckets 2350 isobscure/oblivious to the untrusted distributed system 2140. The smallerdata buckets 2350 subdivide the O-RAM of the storage abstraction 2150 toincrease bandwidth when the distributed system 2140 and the clientdevice 2120 are performing permutation operations during execution ofthe oblivious permutation routine 2300. Moreover, the obliviouspermutation routine 2300 may allocate substantially n buffer buckets2360, 2360 a-n associated with the new memory locations 2118.

In some examples, substantially √{square root over (N)} encompasses arange of values, such as between N^(0.1) and N^(0.75). Other ranges arepossible as well. In additional examples, substantially √{square rootover (N)} includes: N^(0.5), which provides an algorithm with oneround-trip); N^(1/3), which provides an algorithm with 2 round-trips;and N^(0.20), which provides an algorithm with 4 round-trips. Relativelysmaller values, may be less useful, since N could be impracticallylarge. For relatively larger values, the gain in the algorithm may beless useful as well.

At the trusted side, the client device 2120 may iteratively downloadeach of the n data buckets 2350 one at a time from the distributedsystem 2140 and allocates substantially n cache slots 2370, 2370 a-n onthe memory hardware 2122 while executing the oblivious permutationroutine 2300. Each cache slot 2370 is associated with a correspondingbuffer bucket 2360 allocated by the routine 2300 at the distributedsystem 2140. For each data bucket 2350 received, the client device 2120applies a random permutation on the n data blocks 2102 within thecorresponding data bucket 2350 to generate permutated data blocks anddetermines a corresponding buffer bucket 2360 and a corresponding cacheslot for each permutated data block 2102. The client device 2120 mayprovide each of the permutated data blocks 2102 into the correspondingcache slot 2370 associated with the corresponding buffer bucket 2360.Here, the cache slots 2370 may temporarily store the recently permutateddata blocks 2102 at the memory hardware 2122 of the client device 2120until the data blocks 2102 are uploaded/sent to the distributed system2140 for storage at the new memory locations 2118. Some of the datablocks 2102 may upload from their respective cache slot 2370 to thecorresponding new memory location 2118 before preceding to the nextiteration of downloading a subsequent data bucket 2350. In someexamples, the cache slots 2370 collectively provide a storage capacityof n permutated data blocks 2102 at any given time. However, the memoryhardware 2122 at the client device 2120 may additionally storemiscellaneous states and information, such as cryptographic keys forauthentication, encryption, and pseudo-random permutations.

During the current iteration, for each buffer bucket 2360, the clientdevice 2120 is further configured to determine a quantity of data blocksto be sprayed into the buffer bucket 2360 and a strategy for selectingdata blocks to be sprayed into the buffer bucket 2360 from at least oneof: corresponding permutated data blocks 2102, cached permutated datablocks 2102 from the corresponding cache slot 2370; or dummy data blocks2103. Subsequently, the client device 2120 may spray/evict (i.e.,upload) the selected data blocks into the buffer buckets 2360 accordingto the strategy, store any unselected permutated data blocks in theircorresponding cache slots, and remove any selected cached permutateddata blocks 2102 from their corresponding cache slots 2370. In someimplementations, the strategy for selecting the quantity of data blocksto be sprayed into each corresponding buffer bucket 2360 follows astrict priority order that includes: first, selecting from thecorresponding permutated data blocks 2102; second, selecting from thecached permutated data blocks 2102 from the corresponding cache slot2370; and third, selecting dummy data blocks 2103.

In some examples, the quantity of data blocks to be sprayed into abuffer bucket 2360 corresponds to a threshold value k that may be anyvalue independent from the number of permutated data blockscorresponding to the buffer bucket 2360. Thus, the threshold value k maybe any value independent of the number of data blocks 2102 currentlyresiding at the client device 2120 (i.e., stored in the cache slots2370). The threshold value k must be large enough so that the clientdevice 2120 is never storing more than n data blocks 2102 at any givenpoint in time. However, the threshold value k must also be small enoughto have unselected data blocks 2102 leftover from spray iterations andstored in the corresponding cache slots 2370. For instance, largerthreshold values k (e.g., k>O(log N/log log N)) result in all datablocks 2102 being selected after permutation and sprayed with a veryhigh probability (but not guaranteed) of not having leftover/unselectedblocks stored in the client cache slots 2370. The threshold value k maychange during each iteration or may change every i^(th) iteration in arepeating or non-repeating fashion. Any unselected data blocks 2102 arenot sprayed during the current spray iteration and may be stored intheir corresponding cache slots 2370 until a subsequent spray iteration(i.e., after the client device 2120 subsequently downloads one or moredata buckets 2350). In some examples, the quantity of data blocks to besprayed (i.e., selected data blocks) into one buffer bucket 2360 isdifferent than the quantity of data blocks to be sprayed into anotherbuffer bucket 2360 during the same iteration. Moreover, the quantity ofdata blocks to be sprayed into one buffer bucket 2360 may be differentthan the quantity of data blocks to be sprayed into another bucket 2360between separate iterations.

In some examples, when a cache slot 2370 includes zero data blocks 2102or a number of data blocks 2102 less than the threshold value k, theroutine 2300 causes the client device 2120 to spray the one or moredummy blocks 2103 to make up the difference between k and the number ofdata blocks 2102 within the corresponding cache slot 2370. Thus, the“quantity of data blocks” sprayed may include all permutated data blocks2102, all dummy blocks 2103, or a combination of one or more permutateddata blocks 2102 and one or more dummy blocks 2103. In some examples,the client device 2120 sprays up to the threshold value k over a seriesof two or more spray iterations. For instance, the client device 2120may spray one (1) data block 2102 (e.g., or a dummy block 2103 when thedata block 2102 is not available) during three (3) consecutive sprayiterations and then spray two (2) data blocks 2102 (e.g., or at leastone dummy block 2102 if less than two data blocks 2102 are available)during a fourth iteration when the threshold value of k is equal to avalue of 1.25. Similarly, a threshold value of k equal to 1.5 may resultin client device 2120 spraying one (1) data block 2102 and then two (2)data blocks 2102 every other iteration. The client device 2120 may tagor pre-pend the data blocks 2102 and/or the dummy blocks 2103 so thatdummy blocks 2103 can be identified for removal during a recalibrationstage 2400 (FIGS. 2.4A and 2.4B).

Upon applying the random permutation on the n data blocks 2102 from thecorresponding downloaded bucket 2350, selecting data blocks to besprayed into each buffer bucket according to the strategy, spraying theselected data buckets into their corresponding buffer buckets 2360, andstoring any unselected permutated data blocks 2102 at the cache slots2370, the client device 2120 may download the next n data bucket 2350and repeat the application of the random permutation andspraying/storing as set forth above during the next iteration. Afterdownloading the last n data bucket 2350 and applying the randompermutation on the n data blocks 2102 associated therewith, the clientdevice 2120 sprays the quantity of selected data blocks 2102 accordingto the strategy into their corresponding buffer buckets 2360. With allof the N data blocks now randomly assigned to their corresponding newmemory locations 2118 allocated in the memory 2114 and residing withinthe corresponding buffer buckets 2360, the oblivious permutation routine2300 may cause the distributed system 2140 to de-allocate the databuckets 2350 associated with the old/stale memory locations 2118.

During each spray iteration, the number of data blocks 2102 and/or dummyblocks 2103 within each of the buffer buckets 2360 increases. After thelast spray iteration (i.e., the n^(th) spray iteration), the capacity ofeach of the n buffer buckets 2360 includes the n data blocks 2102 aswell as any dummy blocks 2103 sprayed to compensate for iterations whenthe number of data blocks 2102 within a corresponding cache slot 2370 isless than the threshold value k. In some implementations, the obliviouspermutation routine 2300 includes a recalibration stage 2400 (FIGS. 2.4Aand 2.4B) whereby the client device 2120 iteratively downloads each ofthe n buffer buckets 2360 one at a time from the distributed system2140. Accordingly, the recalibration stage 2400 includes n iterations orrounds. In some examples, the client device 2120 filters and removes allof the dummy blocks 2103 contained within the corresponding bufferbucket 2360 downloaded from the distributed system 2140 during thecurrent iteration. Additionally, the client device 2120 may againdecrypt and re-encrypt each of the data blocks 2102 within thecorresponding buffer bucket 2360 and then order the data blocks 2102correctly before uploading the corresponding buffer bucket 2360 back tothe distributed system 2140. Upon recalibrating each buffer bucket 2360,the oblivious permutation routine 2300 has successfully permutated the Nitems without revealing any portion of the permutation to thedistributed system 2140. Thus, re-encrypting of the data blocks 2102prevents the distributed system 2140 from the ability to link the datablocks 2102 based on their content.

Referring to FIG. 2.2 , in some implementations, the distributed storagesystem 2140 includes loosely coupled memory hosts 2110, 2110 a-z (e.g.,computers or servers), each having a computing resource 2112 (e.g., oneor more processors or central processing units (CPUs)) in communicationwith storage resources 2114 (e.g., memory hardware, memory hardware,flash memory, dynamic random access memory (DRAM), phase change memory(PCM), and/or disks) that may be used for caching data. The storageabstraction 2150 overlain on the storage resources 2114 allows scalableuse of the storage resources 2114 by one or more user devices 2120, 2120a-n. The user devices 2120 may communicate with the memory hosts 2110through the network 2130 (e.g., via remote procedure calls (RPC)).

In some implementations, the distributed storage system 2140 is“single-sided,” eliminating the need for any server jobs for respondingto RPC from user devices 2120 to oblivious move data blocks 2102 aroundthe storage abstraction 2150 when executing the oblivious permutationroutine 2300. “Single-sided” refers to the method by which most of therequest processing on the memory hosts 2110 may be done in hardwarerather than by software executed on CPUs 2112 of the memory hosts 2110.Additional concepts and features related to a single-sided distributedcaching system can be found in U.S. Pat. No. 9,164,2702, which is herebyincorporated by reference in its entirety.

The distributed system 2140 may obliviously move data blocks 2102 aroundthe storage resources 2114 (e.g., memory hardware) of the remote memoryhosts 2110 (e.g., the storage abstraction 2150) and get the data blocks2102 from the remote memory hosts 2110 via RPCs or via remote directmemory access (RDMA)-capable network interface controllers (NIC) 2116. Anetwork interface controller 2116 (also known as a network interfacecard, network adapter, or LAN adapter) may be a computer hardwarecomponent that connects a computing device/resource 2112 to the network2130. Both the memory hosts 2110 a-z and the user device 2120 may eachhave a network interface controller 2116 for network communications. Theoblivious permutation routine 2300 executing on the physical processor2112 of the hardware resource 2110 registers a set of remote directmemory accessible regions/locations 2118A-N of the memory 2114 with thenetwork interface controller 2116. Each memory location 2118 isconfigured to store a corresponding data block 2102. The routine 2300further allocates new memory locations 2118 to store each correspondingdata block 2102 permutated by the client device 2120. Once all the datablocks 2102 are re-permutated and dummy blocks 2103 are filtered out andremoved, the routine 2300 may de-allocate the stale memory locations2118 from which the re-permutated data blocks 2102 were obviously movedfrom. For instance, the client device 2120 may tag the data blocks 2102and/or the dummy blocks 2103 when spraying into the corresponding bufferbuckets 2360 so that the dummy blocks 2103 can be identified for removalduring the recalibration stage 2400.

In some implementations, the client device 2120 transmits an obliviouspermutation request 2302 to instruct the data processing hardware 2112of the hardware resource 2110 to execute the oblivious permutationroutine 2300 for obliviously moving the data blocks 2102 stored at thememory 2114 to new memory locations 2118. The routine 2300 may dividethe new memory locations 2118 into the n data buckets 2350 eachcontaining n data blocks 2102 and the client device 2120 may issue abucket download request 2304 over the distributed system 2140 todownload each data bucket 2350 one at a time. The NIC 2116 may retrievethe requested data bucket 2350 and the corresponding n data blocks 2102from the storage abstraction 2150 and provide the requested data bucket2350 to the client device 2120. Downloading the data buckets 2350 inisolation allows the client device 2120 to apply the random permutationon only n data blocks 2102 at a time to reduce the load on the clientdevice 2120 as well as reduce the amount of data stored at the clientmemory hardware 2122 (i.e., within the cache slots 2370). During eachspray iteration, the client device 2120 may spray up to the thresholdvalue k of data blocks 2102 and/or dummy blocks 2103 into thecorresponding buffer buckets 2360 associated with the new memorylocations 2118 at the distributed system 2140.

FIGS. 2.3A-2.3J provide an example oblivious permutation routine 2300executing on the client device 2120 and the distributed system 2140 toobliviously move data blocks 2102 stored on the distributed system 2140.Referring to FIG. 2.3A, the client device 2120 transmits the obliviouspermutation request 2302 to the distributed system 2140 for obliviouslymoving data blocks 2102A-N stored on the O-RAM storage abstraction 2150overlain on the memory hardware 2114 of the distributed system 2140. Thedata blocks 2102A-N may be owned and encrypted by the client device 2120using client-side keys and searchable, via queries, without giving aservice provider of the distributed system 2140 plain text access to thestored data. For simplicity, the N data blocks 2102 is equal to sixteen(16). In some examples, the client 2104 corresponds to an enterprise oran employee of the enterprise. The distributed system 2140divides/partitions the current memory locations 2118 of the storageabstraction 2150 into n data buckets 2350 a, 2350 b, 2350 c, 2350 n thateach contain n data blocks 2102. Thus, the current memory locations 2118are divided/partitioned into four (4) data buckets 2350 a-2350 n eachcontaining four (4) data blocks 2102. In the example shown, data blocks1-4 reside in the first data bucket 2350 a, data blocks 5-8 reside inthe second data bucket 2350 b, data blocks 9-12 reside in the third databucket 2350 c, and data blocks 13-16 reside in the fourth data bucket2350 n. The distributed system 2140 further allocates new memorylocations 2118 in the storage abstraction 2150 for storing the N blocks2102 after permutation and initializes n buffer buckets 2360 a, 2360 b,2360 c, 2360 d associated with the new memory locations 2118. The clientdevice 2120 simultaneously allocates/initializes n cache slots 2370 a,2370 b, 2370 c, 2370 n in the client memory hardware 2122 eachassociated with a corresponding buffer bucket 2360 a, 2360 b, 2360 c,2360 n of the storage abstraction 2150. The client device 2120 maytransmit a bucket download request 2304 to the distributed system 2140requesting to download one of the data buckets 2350 and apply the randompermutation on the n data blocks 2102 residing in the requested databucket 2350. The client device 2120 may iteratively send the bucketdownload request 2304 each time the client device 2120 is ready to applythe random permutation on the n data blocks 2102 residing in the nextdata bucket 2350.

The client device 2120 may execute an encryption module 2305 or accessthe encryption module 2305 to randomly select an Advanced EncryptionStandard (AES) key for use in applying the random permutation on thedata blocks 2102 as well as encrypting, decrypting, and re-encryptingthe data blocks 2102. Accordingly, the encryption module 2305 mayprovide a randomly generated key (e.g., an AES key) for obliviouslymoving the data blocks 2102 to new memory locations 2118 of the storageabstraction 2150 without revealing the permutation to the distributedsystem 2140. In some examples, the randomly generated key is temporaryand new keys are randomly generated each time the data blocks 2102 arere-permutated.

Referring to FIG. 2.3B, the distributed system 2140 provides the firstdata bucket 2350 a to the client device 2120 in response to receivingthe bucket download request 2304. In the example shown, the data bucket2350 a contains n data blocks 2102 (Blocks 1-4). In response toreceiving the data bucket 2350 a from the distributed system 2140, theclient device 2120 applies a random permutation on the n data blocks2102 (Blocks 1-4) to determine the corresponding new memory location2118A-N and the corresponding buffer bucket 2360 a-n associated witheach permutated data block 2102. In some examples, the client device2120 applies the random permutation by decrypting and re-encrypting eachof the n data blocks 2102 received within the first data bucket 2350 a,and applying the random permutation on the re-encrypted n data blocks2102. For instance, the client device 2120 may use the randomlygenerated key (i.e., AES key) provided from the encryption module 2305(FIG. 2.3A) to obfuscate the permutation from the distributed system2140. In some examples, the random permutation applied by the clientdevice 2120 includes shuffling the re-encrypted n data blocks (Blocks1-4) using a cryptographically secure random key hidden from thedistributed system 2140.

Moreover, the client device 2120 randomly selects the threshold value kfor use in spraying the re-permutated data blocks 2102 into theirassigned buffer buckets 2360 of the memory hardware 2114 at thedistributed system 2140. The threshold value k may be randomly selectedindependent of the data currently stored at the client device 2120,i.e., independent of the load of each cache slot 2370, and independentof the number of permutated data blocks 2102 corresponding to eachbuffer bucket 2360. For each buffer bucket 2360, the client device 2120may execute a separate process/routine to determine a quantity of datablocks (e.g., threshold value k) to be sprayed into the buffer bucketand a strategy for selecting data blocks to be sprayed into the bufferbucket from at least one of: corresponding permutated data blocks;cached permutated data blocks from the corresponding cache slot; ordummy data blocks. In some examples, the client device 2120 executes theseparate process/routine for determining the quantity of data blocks tobe sprayed into each buffer bucket 2360 when the client device 2120applies the random permutation on the re-encrypted data blocks 2102. Thethreshold value k must be large enough to prevent the number of datablocks 2102 locally stored at the cache slots 2370 of the client memoryhardware 2122 from exceeding the value n (i.e., n=4 data blocks 2102 inthe example shown). In the example oblivious permutation routine 2300 ofFIGS. 2.3A-2.3J, the threshold value k is equal to 1.25 such that thesequence of data blocks 2102 and/or dummy blocks 2103 sprayed into thebuffer buckets 2360 during the n spray iterations (i.e., n=4) is 1, 1,1, 2. However, any sequence achieving the threshold value k equal to1.25 during the n iterations may be used.

After the data blocks 2102 (Blocks 1-4) are permutated, the clientdevice 2120 provides each permutated data block 2102 into thecorresponding cache slot 2370 of the client memory hardware 2122. In theexample shown, the second cache slot C₂ 2370 b receives Blocks 1, 3 and4 and the fourth cache slot C₄ 2370 n receives Block 2. The first cacheslot C₁ 2370 a and the third cache slot C₃ 2370 c do not receive anydata blocks 2102 during the current iteration as the random permutationapplied to the first data bucket 2350 a did not assign any of the datablocks 2102 to any of the new memory locations 2118 associated with thefirst and third buffer buckets 2360 a, 2360 c.

Referring to FIG. 2.3C, the client device 2120 executes a first sprayiteration (also referred to as a spray round) to spray/evict up to thethreshold value k of the permutated data blocks 2102 (Blocks 1-4) fromeach cache slot 2370 into the corresponding buffer buckets 2360. As thethreshold value k is equal to 1.25 in the example, the client device2120 will spray up to one (1) data block 2102 from each cache slot 2370a, 2370 b, 2370 c, 2370 n during the first spray iteration (and also thesecond and third spray iterations (FIGS. 2.3E and 2.3G)). In someexamples, the client device 2120 sprays a number of the permutated datablocks 2102 equal to the threshold value k (i.e., the selected quantityof data blocks) from a corresponding cache slot 2370 when thecorresponding cache slot 2370 contains at least the threshold value k ofthe permutated data blocks. For instance, the client device 2120sprays/evicts one (1) data block 2102 (Block 1) from the second cacheslot C₂ 2370 b into the second buffer bucket 2360 b since the secondcache slot C₂ 2370 b is presently storing three data blocks 2102.Likewise, the client device 2120 sprays/evicts one (1) data block 2102(Block 2) from the fourth cache slot C₄ 370 d into the fourth bufferbucket 2360 n since the fourth cache slot C₄ 370 d is presently storingone data blocks 2102.

In some implementations, the permutation routine 2300 also identifiesany cache slots 2370 containing a number of permutated data blocks 2102less than the threshold value k, and sprays/evicts a number of dummyblocks 2103 into the corresponding buffer bucket 2360 based on adifference between the threshold value k and the number of permutateddata blocks 2102 within the corresponding cache slot 2370. Thus, thedummy blocks 2103 represent meaningless data blocks to not reveal to thedistributed system 2140 that a cache slot 2370 is empty during a currentiteration. Since the first cache slot C₁ 2370 a and the third cache slotC₃ 2370 c are not presently storing any data blocks 2102, the clientdevice 2120 sprays/evicts one dummy block 2103 into each of the firstand third buffer buckets 2360 a, 2360 c. The client device 2120 mayencrypt the dummy blocks 2103 similar to the data blocks 2102. The dummyblocks 2103 may reside in the cache slots 2370 or may be generated bythe client device during each spray iteration as needed. The sending ofdummy blocks 2103 is a security measure to conceal the age of datablocks 2102 stored in the storage abstraction 2150 from the untrusteddistributed system 2140. Additionally, the sending of encrypted dummyblocks 2103 conceals which cache slots 2370 contain data blocks 2102 andwhich cache slots 2370 are empty during each spray iteration as asecurity measure to linkability attacks on the distributed system 2140.

The cache slots 2370 allow recently permutated data blocks 2102 eachassociated with an assigned buffer bucket 2360 to be temporarily storedlocally at the client device 2120 until the routine 2300 is ready tospray/evict the data blocks 2102 into their corresponding buffer buckets2360. The cache slots 2370 a-n collectively provide a queue for theclient device 2120 that maps each permutated data block 2102 to thecorresponding new memory location 2118 at the storage abstraction 2150of the distributed system 2140. Accordingly, each data block 2102currently residing in one of the cache slots 2370 corresponds to anup-to-date version associated with a new memory location 2118 that isoblivious to the distributed system 2140.

Referring to FIG. 2.3D, the distributed system 2140 provides the seconddata bucket 2350 b to the client device 2120 for the next iteration inresponse to receiving a next bucket download request 2304 from theclient device 2120. In the example shown, the first and third bufferbuckets 2360 a, 2360 c contain dummy blocks 2103, the second bufferbucket 2360 b contains the data block 2102 (Block 1), and the fourthbuffer bucket 2360 d contains the data block 2102 (Block 2) evicted fromthe client cache slots 2370 during the previous spray iteration.Moreover, the client device 2120 is configured to store any remainingpermutated data blocks 2102 in their corresponding cache slots 2370 thatare left over after one or more previous spray iterations. In theexample shown, the second cache slot C₂ 2370 b is temporarily storingtwo permutated data blocks 2102 (Blocks 3 and 4) left over from theprevious spray iteration.

The downloaded second bucket 2350 b contains n data blocks 2102 (Blocks5-8). As with the first bucket 2350 a, the permutation routine 2300causes the client device 2120 to apply a random permutation on the ndata blocks 2102 (Blocks 5-8) to determine the corresponding new memorylocation 2118A-N and the corresponding buffer bucket 2360 a-n associatedwith each permutated data block 2102. Here, the client device 2120decrypts and re-encrypts each data block (Blocks 5-8) and applies therandom permutation on the re-encrypted data blocks 2102 by locallyshuffling the order of the re-encrypted data blocks 2102 using randombits hidden from the distributed system based on the previous or a newrandomly generated key (i.e., AES key). Thereafter, the client device2120 provides each permutated data block 2102 into the correspondingcache slot 2370 of the client memory hardware 2122. In the exampleshown, the first cache slot C₁ 2370 a receives Blocks 6 and 8, the thirdcache slot C₃ 2370 c receives Block 5, and the fourth cache slot C₄ 2370n receives Block 7. The second cache slot C₂ 2370 b does not receive anydata blocks 2102 during the current iteration as the random permutationapplied to the second data bucket 2350 b did not assign any of the datablocks 2102 to any of the new memory locations 2118 associated with thesecond buffer bucket 2360 b.

Referring to FIG. 2.3E, the client device 2120 executes a second sprayiteration to spray/evict up to the threshold value k of the permutateddata blocks 2102 (Blocks 3-8) from each cache slot 2370 into thecorresponding buffer buckets 2360. As the threshold value k is equal to1.25 in the example to provide the iterative spray sequence of 1, 1, 1,2, the client device 2120 will spray up to one (1) data block from eachcache slot 2370 a, 2370 b, 2370 c, 2370 n during the current secondspray iteration. For instance, the client device 2120 sprays/evicts datablock (Block 6) from the first cache slot C₁ 2370 a into the firstbuffer bucket 2360 b, data block (Block 3) from the second cache slot C₂2370 b into the second buffer bucket 2360 b, data block 2102 (Block 5)from the third cache slot C₃ 2370 c into the third buffer bucket 2360 c,and data block 2102 (Block 7) from the fourth cache slot C₄ 2370 n intothe fourth buffer bucket 2360 n.

Referring to FIG. 2.3F, the distributed system 2140 provides the thirddata bucket 2350 c to the client device 2120 for the next iteration(i.e., 3^(rd) iteration) in response to receiving a next bucket downloadrequest 2304 from the client device 2120. The first buffer bucket 2360 acontains one dummy block 2103 and one data block (Block 6), the secondbuffer bucket 2360 b presently contains two data blocks (Blocks 1 and3), the third buffer bucket 2360 c contains one dummy block 2103 and onedata block (Block 5), and the fourth buffer bucket 2360 n contains twodata blocks (Blocks 2 and 7). Moreover, the client device 2120 isconfigured to store any remaining permutated data blocks 2102 in theircorresponding cache slots 2370 that are left over after one or moreprevious spray iterations. In the example shown, the first cache slot C₁2370 a temporarily stores one data block 2102 (Block 8) and the secondcache slot C₂ 2370 b temporarily stores one data block 2102 (Block 4)left over from one or more previous spray iterations.

In response to receiving the downloaded third bucket 2350 c containing ndata blocks 2102 (Blocks 9-12), the permutation routine 2300 causes theclient device 2120 to apply a random permutation on the n data blocks2102 (Blocks 9-12) to determine the corresponding new memory location2118A-N and the corresponding buffer bucket 2360 a-n associated witheach permutated data block 2102. Here, the client device 2120 decryptsand re-encrypts each data block (Blocks 9-12) and applies the randompermutation on the re-encrypted data blocks 2102 by locally shufflingthe order of the re-encrypted data blocks 2102 using a cryptographicallysecure random key hidden from the the distributed system based on theprevious or a new randomly generated key (i.e., AES key). Thereafter,the client device 2120 provides each permutated data block 2102 into thecorresponding cache slot 2370 of the client memory hardware 2122. In theexample shown, the first cache slot C₁ 2370 a receives Blocks 11 and 12,the third cache slot C₃ 2370 c receives Block 10, and the fourth cacheslot C₄ 2370 n receives Block 9. As with the second iteration (bycoincidence and example only), the second cache slot C₂ 2370 b does notreceive any data blocks 2102 during the current third iteration as therandom permutation applied to the third data bucket 2350 c did notassign any of the data blocks 2102 to any of the new memory locations2118 associated with the second buffer bucket 2360 b.

Referring to FIG. 2.3G, the client device 2120 executes a third sprayiteration to spray/evict up to the threshold value k of the permutateddata blocks 2102 (e.g., Blocks 4, and 8-12) from each cache slot 2370into the corresponding buffer buckets 2360. As the threshold value k isequal to 1.25 in the example to provide the iterative spray sequence of1, 1, 1, 2, the client device 2120 will spray up to one (1) data blockfrom each cache slot 2370 a, 2370 b, 2370 c, 2370 n during the currentthird spray iteration. For instance, the client device 2120sprays/evicts data block (Block 8) from the first cache slot C₁ 2370 ainto the first buffer bucket 2360 a, data block (Block 4) from thesecond cache slot C₂ 2370 b into the second buffer bucket 2360 b, datablock 2102 (Block 10) from the third cache slot C₃ 2370 c into the thirdbuffer bucket 2360 c, and data block 2102 (Block 9) from the fourthcache slot C₄ 2370 n into the fourth buffer bucket 2360 n. The clientdevice 2120 may select to spray one of the most recent permutated datablocks 2102 (Block 11 or Block 12) into the first buffer bucket 2360 ainstead of the cached permutated data block 2102 (Block 8) from thefirst cache slot C₁ 2370 a.

Referring to FIG. 2.3H, the distributed system 2140 provides the fourthand final data bucket 2350 c to the client device 2120 for the lastiteration (i.e., 4th iteration) in response to receiving a next bucketdownload request 2304 from the client device 2120. The first bufferbucket 2360 a contains one dummy block 2103 and two data block (Blocks 6and 8), the second buffer bucket 2360 b presently contains three datablocks (Blocks 1, 3, and 4), the third buffer bucket 2360 c contains onedummy block 2103 and two data blocks (Blocks 5 and 10), and the fourthbuffer bucket 2360 n contains three data blocks (Blocks 2, 7 and 9).Moreover, the client device 2120 is configured to store any remainingpermutated data blocks 2102 in their corresponding cache slots 2370 thatare left over after one or more previous spray iterations. In theexample shown, the first cache slot C₁ 2370 a temporarily stores twodata block 2102 (Blocks 11 and 12) left over from the previous sprayiteration. Thus, Blocks 11 and 12 correspond to previously unselecteddata blocks according to the strategy.

In response to receiving the downloaded fourth bucket 2350 n containingn data blocks 2102 (Blocks 13-16), the permutation routine 2300 causesthe client device 2120 to apply a random permutation on the n datablocks 2102 (Blocks 13-16) to determine the corresponding new memorylocation 2118A-N and the corresponding buffer bucket 2360 a-n associatedwith each permutated data block 2102. Here, the client device 2120decrypts and re-encrypts each data block (Blocks 13-16) and applies therandom permutation on the re-encrypted data blocks 2102 by locallyshuffling the order of the re-encrypted data blocks 2102 using acryptographically secure random key hidden from the distributed systembased on the previous or a new randomly generated key (i.e., AES key).Thereafter, the client device 2120 provides each permutated data block2102 into the corresponding cache slot 2370 of the client memoryhardware 2122. In the example shown, the second cache slot C₂ 2370 breceives Block 15, the third cache slot C₃ 2370 c receives Blocks 14 and16, and the fourth cache slot C₄ 2370 n receives Block 13. The firstcache slot C₁ 2370 a does not receive any data blocks 2102 during thecurrent fourth iteration as the random permutation applied to the fourthdata bucket 2350 n did not assign any of the data blocks 2102 to any ofthe new memory locations 2118 associated with the first buffer bucket2360 a.

Referring to FIG. 2.31 , the client device 2120 executes a final fourthspray iteration to spray/evict up to the threshold value k of thepermutated data blocks 2102 (e.g., Blocks 11-14) from each cache slot2370 into the corresponding buffer buckets 2360. As the threshold valuek is equal to 1.25 in the example to provide the iterative spraysequence of 1, 1, 1, 2, the client device 2120 will spray up to two (2)data blocks from each cache slot 2370 a, 2370 b, 2370 c, 2370 n duringthe current fourth spray iteration. For instance, the client device 2120sprays/evicts data blocks (Block 11 and 12) from the first cache slot C₁2370 a into the first buffer bucket 2360 b, data block (Block 15) fromthe second cache slot C₂ 2370 b into the second buffer bucket 2360 b,data blocks 2102 (Block 14 and 16) from the third cache slot C₃ 2370 cinto the third buffer bucket 2360 c, and data block 2102 (Block 13) fromthe fourth cache slot C₄ 2370 n into the fourth buffer bucket 2360 n. Inthe example shown, the permutation routine 2300 identifies, during thefourth iteration, that each of the second cache slot C₂ 2370 b and thefourth cache slot C₄ 2370 n each contain one data block 2102, andtherefore requires the current spray iteration to spray dummy blocks2103 to make up the difference from the threshold value k which is equalto “2” during the last spray iteration. Accordingly, the routine 2300causes the client device 2120 to spray/evict one dummy block 2103 withthe one data block (Block 15) into the second buffer bucket 2360 b andone dummy block 2103 with the one data block (Block 13) into the fourthbuffer bucket 2360 n. Accordingly, the dummy blocks 2103 obfuscate thefact that the cache slots 2370 b, 2370 n only contain one data block2102 each from the distributed system 2140.

After the final spray iteration, all of the data blocks 2102 permutatedby the oblivious permutation routine 2300 executing on the client device2120 are evicted from the cache slots 2370 of the client memory hardware2122 and now reside in their corresponding buffer buckets 2360. However,other examples may include the cache slots 2370 still storing somepermutated data blocks 2102 after the last spray iteration. In theseexamples, any remaining permutated data blocks 2102 leftover and storedat their corresponding cache slots 2370 may be combined with the datablocks 2102 previously sprayed into the corresponding buffer bucket 2360during the recalibration stage 2400. FIG. 2.3J shows the permutationroutine 2300 causing the client device 2120 to send/transmit ade-de-allocate bucket request 2306 to the distributed system 2140 tode-allocate each of the stale/old data buckets 2350 a-2350 n from theO-RAM storage abstraction 2150 overlain on the memory hardware 2114 ofthe distributed system 2140. In the example shown, each of the bufferbuckets 2360 a-n contain n permutated data blocks 2102 (e.g., n=4) andone or more dummy blocks 2103. The oblivious permutation routine 2300may further include a recalibration process 2400 (FIGS. 2.4A and 2.4B)that iteratively recalibrates each of the virtual buckets 2360 a-n on anindividual basis to filter out and remove all any dummy blocks and orderthe data blocks 2102 according to the applied permutation.

FIGS. 2.4A and 2.4B provide an example recalibration process 2400executing on the client device 2120 and the distributed system 2140 tore-calibrate the virtual buckets 2360 a-n containing the most recentpermutations of the data blocks 2102. Referring to FIG. 2.4A, the clientdevice 2120 may transmit a buffer bucket download request 2404 to thedistributed system 2140 requesting to download one of the buffer buckets2360 filled with permutated data blocks 2102 and at least one dummyblock 2103 during the permutation routine 2300 and recalibrate therequested buffer bucket 2360 to include only the assigned data blocks2104 ordered according to the applied permutation. The client device2120 may iteratively send the buffer bucket download request 2404 eachtime the client device 2120 is ready to recalibrate the next bufferbucket 2360. Accordingly, each request 2404 may identify the requestedbuffer bucket 2360 for download from the distributed system 2140. In theexample shown, the client device 2120 sends the bucket download request2404 to download the first buffer bucket 2360 a for download during afirst recalibration iteration of the recalibration process.

Referring to FIG. 2.4B, the recalibration process 2400 causes thedistributed system 2140 to provide the first buffer bucket 2360 a to theclient device 2120 in response to receiving the buffer bucket downloadrequest 2404 from the client device 2120 requesting the first bufferbucket 2360 a. The buffer bucket 2360 a includes n data blocks 2102(Blocks 6, 8, 11, 12) and one dummy block 2103 sprayed/evicted from thefirst client cache slot C₁ 2370 a during the n spray iterations of theoblivious permutation routine 2300 of FIGS. 2.3A-2.3J. In response toreceiving the buffer bucket 2360 a from the distributed system 2140, theclient device 2120 recalibrates the buffer bucket 2360 a by firstfiltering out and removing any dummy blocks 2103 and thendecrypting/re-encrypting each of then data blocks 2102 (Blocks 6, 8, 11,12) received within corresponding buffer bucket 2360 a. With the dummyblock(s) 2103 removed and the n data blocks 2102 again re-encrypted, theclient device 2120 may order the re-encrypted data blocks (Blocks 6, 8,11, 12) according to the random permutation applied during execution ofthe oblivious permutation process 2300 to complete the recalibration ofthe buffer bucket 2360 a. Thereafter, the client device 2120 uploads therecalibrated buffer bucket 2360 a including only the n data blocks 2102to the O-RAM storage abstraction 2150 of the distributed system 2140 forstorage on each corresponding new memory location 2118A-N of the memoryhardware 2114. The client device 2120 may then iteratively send/transmitthe next buffer bucket download request 2404 to the distributed system2140 for iteratively recalibrating each of the remaining buffer buckets2360 b, 2360 c, 2360 n on an individual basis.

The oblivious permutation process 2300 of FIGS. 2.3A-2.3J requires theclient memory hardware 2122 to have O(n) blocks of storage. FIG. 2.5provides an example algorithm 2500 for applying obliviously shufflingwhen the client memory hardware 2122 as the capacity of O(n) blocks ofstorage. In some implementations, the permutation process 2300 executesin recursive manner to thereby eliminate the requirement of the clientmemory hardware 2122 to have O(n) blocks of storage. As used herein the“O” is a notation for asymptotic complexity. Here, the capacity/size ofthe data buckets 2350 may be increased to decrease the total number ofdata buckets 2350 at the storage abstraction 2150 and decrease thestorage capacity required at the client memory hardware 2122. Forinstance, assuming that the client memory hardware 2122 has a capacityof n=log N·ω(1) and given an input of |A| items to recursively andobliviously shuffle (RecursiveObvShuffle), the routine 2300 may split Ainto r=|A|/n buckets each containing n data blocks 2102 and split thebuffer buckets 2360 into n buffer buckets each of r items. Thereafter,the client device 2120 may iteratively spray data block. However, therecalibration process 2400 may not execute since r is greater than n(r>n) and therefore the client device 2120 is unable to download allitems from a single buffer bucket 2360. Instead, knowing that all of theitems are sprayed into the appropriate buffer bucket 2360, the clientdevice may execute the RecursiveObvShuffle on the smaller instance ofsize equal to r. The client may repeat as a many times until theinstance is small enough for download. FIG. 2.6 provides an examplealgorithm 2600 for applying obliviously shuffling when the client memoryhardware 2122 as the capacity of n=log N·ω(1). Additionally, usingsmaller values of the threshold value k (but still greater than zero)increases the client storage capacity such that less data blocks 2102are sprayed into their corresponding buffer buckets 2360 during eachspray iteration and the cache slots 2370 grow larger.

FIG. 2.7 illustrates a method 2700 for obliviously moving data blocks2102 to new memory locations 2118 on memory hardware 2114. At block2702, the method 2700 includes receiving, at data processing hardware2112, a permutation request from a client (i.e., client device 2120) toobliviously move N data blocks 2102 stored in memory hardware 2114 incommunication with the data processing hardware 2112. Each N data block2102 is associated with the client 2104 and stored at a correspondingmemory location 2118, 2118A-N of the memory hardware 2114.

At block 2704, the method 2700 includes organizing, by the dataprocessing hardware 2112, the memory locations 2118 of the memoryhardware 2114 into n data buckets 2350, 2350 a-n. Here, n=√{square rootover (N)} and each data bucket 2350 contains n data blocks 2102. Atblock 2706, the method 2700 includes allocating, by the data processinghardware 2112, new memory locations 2118 in the memory hardware 2114 forstoring the N data blocks 2102. At block 2708, the method includesinitializing, by the data processing hardware 2112, buffer buckets 2360,2360 a-n associated with the new memory locations 2118. Each bufferbucket 2360 is associated with a corresponding cache slot 2370, 2370 a-ninitialized at the client device 2120.

At block 2710, the method includes iteratively providing the n databuckets from the data processing hardware 2112 to the client device2120. For instance, the client device 2120 may send a bucket downloadrequest 2304 for each data bucket 2350. In response to receiving eachdata bucket 2350, the client device 2120 is configured to (1) apply arandom permutation on the n data blocks 2102 within the correspondingdata bucket 2350 to determine the corresponding new memory location 2118and the corresponding buffer bucket 2360 associated with each permutateddata block 2102; provide each permutated; provide each permutated datablock 2102 into the corresponding cache slot 2370; spray up to athreshold value k of the permutated data blocks 2102 from each cacheslot 2370 into the corresponding buffer buckets 2360; and store anyremaining permutated data blocks 2102 in the corresponding cache slots2370.

FIG. 2.8 is schematic view of an example computing device 2800 that maybe used to implement the systems and methods described in this document.The computing device 2800 is intended to represent various forms ofdigital computers, such as laptops, desktops, workstations, personaldigital assistants, servers, blade servers, mainframes, and otherappropriate computers. The components shown here, their connections andrelationships, and their functions, are meant to be exemplary only, andare not meant to limit the various implementations described and/orclaimed in this document.

The computing device 2800 includes a processor 2810 (e.g., dataprocessing hardware 2112), memory 2820, a storage device 2830, ahigh-speed interface/controller 2840 connecting to the memory 2820 andhigh-speed expansion ports 2850, and a low speed interface/controller2860 connecting to low speed bus 2870 and storage device 2830. Thecomputing device 2800 may reside at the client device 2120 and/or thedistributed system 2140. Each of the components 2810, 2820, 2830, 2840,2850, and 2860, are interconnected using various busses, and may bemounted on a common motherboard or in other manners as appropriate. Theprocessor 2810 can process instructions for execution within thecomputing device 2800, including instructions stored in the memory 2820or on the storage device 2830 to display graphical information for agraphical user interface (GUI) on an external input/output device, suchas display 2880 coupled to high speed interface 2840. In otherimplementations, multiple processors and/or multiple buses may be used,as appropriate, along with multiple memories and types of memory. Also,multiple computing devices 2800 may be connected, with each deviceproviding portions of the necessary operations (e.g., as a server bank,a group of blade servers, or a multi-processor system).

The memory 2820 (e.g., memory hardware) stores informationnon-transitorily within the computing device 2800. The memory 2820 maybe a computer-readable medium, a volatile memory unit(s), ornon-volatile memory unit(s). The non-transitory memory 2820 may bephysical devices used to store programs (e.g., sequences ofinstructions) or data (e.g., program state information) on a temporaryor permanent basis for use by the computing device 2800. Examples ofnon-volatile memory include, but are not limited to, flash memory andread-only memory (ROM)/programmable read-only memory (PROM)/erasableprogrammable read-only memory (EPROM)/electronically erasableprogrammable read-only memory (EEPROM) (e.g., typically used forfirmware, such as boot programs). Examples of volatile memory include,but are not limited to, random access memory (RAM), dynamic randomaccess memory (DRAM), static random access memory (SRAM), phase changememory (PCM) as well as disks or tapes.

The storage device 2830 is capable of providing mass storage for thecomputing device 2800. In some implementations, the storage device 2830is a computer-readable medium. In various different implementations, thestorage device 2830 may be a floppy disk device, a hard disk device, anoptical disk device, or a tape device, a flash memory or other similarsolid state memory device, or an array of devices, including devices ina storage area network or other configurations. In additionalimplementations, a computer program product is tangibly embodied in aninformation carrier. The computer program product contains instructionsthat, when executed, perform one or more methods, such as thosedescribed above. The information carrier is a computer- ormachine-readable medium, such as the memory 2820, the storage device2830, or memory on processor 2810.

The high speed controller 2840 manages bandwidth-intensive operationsfor the computing device 2800, while the low speed controller 2860manages lower bandwidth-intensive operations. Such allocation of dutiesis exemplary only. In some implementations, the high-speed controller2840 is coupled to the memory 2820, the display 2880 (e.g., through agraphics processor or accelerator), and to the high-speed expansionports 2850, which may accept various expansion cards (not shown). Insome implementations, the low-speed controller 2860 is coupled to thestorage device 2830 and low-speed expansion port 2870. The low-speedexpansion port 2870, which may include various communication ports(e.g., USB, Bluetooth, Ethernet, wireless Ethernet), may be coupled toone or more input/output devices, such as a keyboard, a pointing device,a scanner, or a networking device such as a switch or router, e.g.,through a network adapter.

The computing device 2800 may be implemented in a number of differentforms, as shown in the figure. For example, it may be implemented as astandard server 2800 a or multiple times in a group of such servers 2800a, as a laptop computer 2800 b, or as part of a rack server system 2800c.

SECTION 3: Efficient Oblivious Cloud Storage

FIGS. 3.1A and 3.1B depict an example system 3100 for storing N datablocks (B) owned by a client 3104 on a distributed system 3140 andobliviously moving the data blocks (B) around the distributed system3140 to conceal access patterns while preserving search functionalitieson the data blocks by the client 3104. A client device 3120 (e.g., acomputer) associated with the client 3104 communicates, via a network3130, with the distributed system 3140 having a scalable/elasticnon-transitory storage abstraction 3200. The client device 3120 mayinclude associated memory hardware 3122 and associated data processinghardware 3124. The storage abstraction 3200 (e.g., key/value store, filesystem, data store, etc.) is overlain on storage resources 3114 to allowscalable use of the storage resources 3114 by one or more client devices3120.

In some implementations, the distributed system 3140 executes acomputing device 3112 that manages access to the storage abstraction3200. For instance, the client device 3120 may encrypt and store thedata blocks (B) on the storage abstraction 3200, as well as retrieve anddecrypt the data blocks (B) from the storage abstraction 3200. While theexample shown depicts the system 3100 having a trusted side associatedwith the client device 3120 in communication, via the network 3130, withan untrusted side associated with the distributed system 3140, thesystem 3100 may be alternatively implemented on a large intranet havinga trusted computing device(s) (CPU) and untrusted data storage.

In some implementations, the distributed system 3100 includes resources3110, 3110 a-z. The resources 3110 may include hardware resources 3110and software resources 3110. The hardware resources 3110 may includecomputing devices 3112 (also referred to as data processing devices anddata processing hardware) or non-transitory memory 3114 (also referredto as memory hardware and storage resources). The software resources3110 may include software applications, software services, applicationprogramming interfaces (APIs) or the like. The software resources 3110may reside in the hardware resources 3110. For example, the softwareresources 3110 may be stored in the memory hardware 3114 or the hardwareresources 3110 (e.g., the computing devices 3112) may be executing thesoftware resources 3110.

A software application (i.e., a software resource 3110) may refer tocomputer software that causes a computing device to perform a task. Insome examples, a software application may be referred to as an“application,” an “app,” or a “program.” Example applications include,but are not limited to, system diagnostic applications, systemmanagement applications, system maintenance applications, wordprocessing applications, spreadsheet applications, messagingapplications, media streaming applications, social networkingapplications, and gaming applications.

The memory hardware 3114, 3122 may be physical devices used to storeprograms (e.g., sequences of instructions) or data (e.g., program stateinformation) on a temporary or permanent basis for use by a computingdevice 3112 and/or a client device 3120 (i.e., the data processinghardware 3124 of the client device 3120). The memory hardware 3114, 3122may be volatile and/or non-volatile addressable semiconductor memory.Examples of non-volatile memory include, but are not limited to, flashmemory and read-only memory (ROM)/programmable read-only memory(PROM)/erasable programmable read-only memory (EPROM)/electronicallyerasable programmable read-only memory (EEPROM) (e.g., typically usedfor firmware, such as boot programs). Examples of volatile memoryinclude, but are not limited to, random access memory (RAM), obliviousrandom access memory (ORAM), dynamic random access memory (DRAM), staticrandom access memory (SRAM), phase change memory (PCM) as well as disksor tapes.

The network 3130 may include various types of networks, such as localarea network (LAN), wide area network (WAN), and/or the Internet.Although the network 3130 may represent a long range network (e.g.,Internet or WAN), in some implementations, the network 3130 includes ashorter range network, such as a local area network (LAN). In someimplementations, the network 3130 uses standard communicationstechnologies and/or protocols. Thus, the network 3130 can include linksusing technologies, such as Ethernet, Wireless Fidelity (WiFi) (e.g.,802.11), worldwide interoperability for microwave access (WiMAX), 3G,Long Term Evolution (LTE), digital subscriber line (DSL), asynchronoustransfer mode (ATM), InfiniBand, PCI Express Advanced Switching,Bluetooth, Bluetooth Low Energy (BLE), etc. Similarly, the networkingprotocols used on the network 3130 can include multiprotocol labelswitching (MPLS), the transmission control protocol/Internet protocol(TCP/IP), the User Datagram Protocol (UDP), the hypertext transportprotocol (HTTP), the simple mail transfer protocol (SMTP), the filetransfer protocol (FTP), etc. The data exchanged over the network 3130can be represented using technologies and/or formats including thehypertext markup language (HTML), the extensible markup language (XML),etc. In addition, all or some of the links can be encrypted usingconventional encryption technologies, such as secure sockets layer(SSL), transport layer security (TLS), virtual private networks (VPNs),Internet Protocol security (IPsec), etc. In other examples, the network3130 uses custom and/or dedicated data communications technologiesinstead of, or in addition to, the ones described above.

The data blocks (B) correspond to atomic units of data and each havesize B bytes each. For example, a typical value for B for storage on adistributed system may be 64 KB to 256 B. A notation N denotes a totalnumber of the data blocks (B) associated with the client 3104 and storedon the storage abstraction 3200 using Oblivious Random Access Memory(O-RAM). Each of the N data blocks is stored at a corresponding memorylocation 3118, 3118A-N (FIG. 3.1B) of the storage abstraction 3200overlain across the memory hardware 3114.

While traditional encryption schemes provide confidentiality, thetraditional encryption schemes are ineffective at hiding data accesspatterns which may reveal very sensitive information to the untrusteddistributed system 3140. Moreover, the traditional encryption schemesallow the client 3104 to search for encrypted data (represented by datablocks (B, B₁-B_(N)) stored on the distributed system 3140 only if theclient 3104 provides plain text access for the data to the distributedsystem 3140. As the client device 3120 originates the data, the clientdevice 3120 is considered trusted.

In some implementations, the client device 3120 and the distributedsystem 3140 execute an oblivious permutation routine 3450 forobliviously moving the encrypted data blocks (B) around the storageabstraction 3200 to completely hide data access patterns (which datablocks (B) were read/written) from the distributed system 3140. Forinstance, the oblivious permutation routine 3450 may cause thedistributed system 3140 to allocate new memory locations 3118 of thestorage abstraction 3200 for storing re-permutated data blocks (B) andorganize/divide/partition the storage abstraction 3200 into multipledata buckets 3350. In some implementations, the oblivious permutationroutine 3450 organizes the storage abstraction 3200 into n data buckets3350 each containing n data blocks (B), whereby the value n is equal tothe square root of the N data blocks (i.e., n=√{square root over (N)}).At the trusted side, the client device 3120 may iteratively downloadeach of the n data buckets 3350 one at a time from the distributedsystem 3140 and allocates substantially n cache slots on the memoryhardware 3122 while executing the oblivious permutation routine 3450.For each data bucket 3350 received, the client device 3120 applies arandom permutation on the n data blocks (B) within the correspondingdata bucket 3350 to generate permutated data blocks and determines acorresponding buffer bucket 3360 and a corresponding cache slot for eachpermutated data block (B). Here, the cache slots may temporarily storethe recently permutated data blocks (B) at the memory hardware 3122 ofthe client device 3120 until the data blocks (B) are uploaded/sent tothe distributed system 3140 for storage at the new memory locations3118. Additional details executing the oblivious permutation routine forobliviously moving the encrypted data blocks (B) around the storageabstraction 3200 can be found in U.S. Patent Application 62/490,804,filed on Apr. 27, 2017, which is hereby incorporated by reference in itsentirety.

In some implementations, when the client device 3120 needs to access(read/write) an encrypted data block (B) stored on the storageabstraction 3200, the data processing hardware 3124 at the client device3120 executes an instruction 3400 to execute a query (q) for the datablock (B). By executing the instruction 3400, the client device 3120 isable to retrieve the data block (B) without revealing the contents ofthe data block (B) as well as the sequence of the query (q) executed bythe client device 3120 to the distributed system 3140. Further,execution of the instruction 3400 completely hides data access patterns(which data blocks (B) were read/written) from the distributed system3140. Execution of the instruction 3400 only requires a single roundtripbetween the client device 3120 and the distributed system 3140 when theclient device 3120 executes the corresponding query (q) for the datablock (B). For instance, all operations that require writing back to theserver are sent with the query. Similarly, all read operations can alsobe sent with the query. All data can also be sent back to thedistributed system 3140 with the query results.

Referring to FIG. 3.1B, in some implementations, the distributed storagesystem 3140 includes loosely coupled memory hosts 3110, 3110 a-z (e.g.,computers or servers), each having a computing resource 3112 (e.g., oneor more processors or central processing units (CPUs)) in communicationwith storage resources 3114 (e.g., memory hardware, memory hardware,flash memory, dynamic random access memory (DRAM), phase change memory(PCM), and/or disks) that may be used for caching data. The storageabstraction 3200 overlain on the storage resources 3114 allows scalableuse of the storage resources 3114 by one or more client devices 3120,3120 a-n. The client devices 3120 may communicate with the memory hosts3110 through the network 3130 (e.g., via remote procedure calls (RPC)).

In some implementations, the distributed storage system 3140 is“single-sided,” eliminating the need for any server jobs for respondingto real and/or fake queries 3402, 3404 from client devices 3120 toretrieve data blocks (B) and/or dummy blocks (D) from the storageabstraction 3200 when the client device executes instructions 3400 toexecute queries (q) for data blocks (B). “Single-sided” refers to themethod by which most of the request processing on the memory hosts 3110may be done in hardware rather than by software executed on CPUs 3112 ofthe memory hosts 3110. Additional concepts and features related to asingle-sided distributed caching system can be found in U.S. Pat. No.9,164,3702, which is hereby incorporated by reference in its entirety.

The distributed system 3140 may obliviously move data blocks (B) aroundthe storage resources 3114 (e.g., memory hardware) of the remote memoryhosts 3110 (e.g., the storage abstraction 3200) and get the data blocks(B) from the remote memory hosts 3110 via RPCs or via remote directmemory access (RDMA)-capable network interface controllers (NIC) 3116. Anetwork interface controller 3116 (also known as a network interfacecard, network adapter, or LAN adapter) may be a computer hardwarecomponent that connects a computing device/resource 3112 to the network3130. Both the memory hosts 3110 a-z and the client device 3120 may eachhave a network interface controller 3116 for network communications. Theoblivious permutation routine 3450 executing on the physical processor3112 of the hardware resource 3110 registers a set of remote directmemory accessible regions/locations 3118A-N of the memory 3114 with thenetwork interface controller 3116. Each memory location 3118 isconfigured to store a corresponding data block (B).

In some implementations, when the client device 3120 executes theinstruction 3400 to execute the query (q) for a data block (B) anddetermines that the data block (B) is stored locally at the memoryhardware 3122 of the client device 3120, the client device 3120retrieves the data block (B) from the memory hardware 3122 and sends oneor more fake queries 3404 to the NIC 3116 for retrieving correspondingdummy blocks (D) to conceal the retrieval of the data block (B) from thelocal memory hardware 3122. The client device 3120 may discard eachretrieved dummy block (D). On the other hand, if the client device 3120determines that the data block (B) is stored on the storage abstraction3200, the client device 3120 may send a real query 3402 to the NIC 3116for retrieving the corresponding data block (D) from the storageabstraction 3200.

The client device 3120 stores a memory-level map 3300 locally in thememory hardware 3122 that maps memory levels (l_(i)) of memory 3118,3122, 3200. The sizes and number of memory levels (l_(i)) may beselected based on query and shuffling costs, in addition to the amountof storage capacity required at each of the client device 3120 and thestorage abstraction 3200. Each memory level (l_(i)) includes physicalmemory (RAM_(i)) 3210 and virtual memory (Shelter_(i)) 3220. As shown inFIG. 3.1A, the virtual memory (Shelter_(l)) 3220 of a lowest memorylevel (l_(l)) resides on the client device 3120 (i.e., within the memoryhardware 3122), while the remaining physical memory (RAM_(i)) 3210 andvirtual memory (Shelter_(i)) 3220 resides on the storage abstraction3200 (e.g., memory hardware 3114) of the distributed system 3140.

FIG. 3.2 provides a schematic view of example memory levels (l_(i))including two levels of memory 3122, 3200. The two levels may beextended to log N levels yielding a slowdown of O(log N) and clientstorage O(N/B) for a RAM capacity of N data blocks (B) of size B. Thefirst level (Level 1) (i=1) includes physical memory (RAM₁) 3210 andvirtual memory (Shelter₁) 3220. In the example shown, the physicalmemory (RAM₁) 3210 of the first level (Level 1) may correspond tovirtual memory (Shelter₀) that initially stores all of the N data blocks(B). The physical memory (RAM₁) 3210 and virtual memory (Shelter₀,Shelter₁) 3220 each reside on the storage abstraction 3200 of thedistributed system 3140. The RAM₁ includes a size of N₁ data blocks (B)and the Shelter₁ includes a size of S₁ data blocks (B), whereby the S₁is equal to the value of N₁ divided by a constant c (i.e., S₁=N₁/c). Theconstant c may be any value greater than one (1) so that thesize/capacity of S₁ data blocks (B) associated with Shelter₁ decreasesfrom the size/capacity of N₁ data blocks (B) stored in the RAM₁. In theexample shown, the value for N₁ is equal to 16 data blocks (B),(B₁-B_(N)) stored in RAM₁ and the constant c is equal to two (2).Accordingly, the virtual memory (Shelter₁) 3220 of the first level(Level 1) includes a value of S₁ equal to eight (8) data blocks (B).

The second level (Level 2), (i=2) includes physical memory (RAM₂) 3210and virtual memory (Shelter₂) 3220. As the memory levels (l_(i)) includetwo levels, the second level (Level 2) corresponds to a lowest memorylevel (l_(i)), and therefore, the physical memory (RAM₂) 3210 resides onthe storage abstraction 3200 and the virtual memory (Shelter₂) 3220resides on the memory hardware 3122 at the client device 3120. The RAM₂includes a size of N₂ data blocks (B) and the Shelter₂ includes a sizeof S₂ data blocks (B), whereby the value of N₂ is equal to the value ofS₁ associated with Shelter₁ of the first level (l−1). Thus, Shelter ofthe first level may correspond to new data blocks (B) stored in the RAM₂at the second level of size N₂=S₁ (e.g., N₂=eight (8) data blocks (B)).Additionally, the value for S₂ of the Shelter₂ is equal to the value ofN₂ divided by the constant c (i.e., S₂=N₂/c). In the example shown, thevalue for N₂ is equal to 8 data blocks (B) stored in RAM₁ and theconstant c is equal to two (2). Accordingly, the virtual memory(Shelter₁) 3220 of the lowest level (l₁) residing on the memory hardware3122 of the client device 3120 includes a value for S₂ equal to four (4)data blocks (B).

FIG. 3.3 provides a schematic view of an example memory-level map 3300residing at the client device 3120 for mapping the memory levels (l_(i))of the memory 3122, 3200. In the example shown, the example memory-levelmap 3300 maps the two memory levels (l_(i)) of FIG. 3.2 . Thememory-level map 3300 maps each data block (B), (B₁-B_(N)) to acorresponding query memory level (l_(q)) associated with a lowest one ofthe memory levels (l_(i)) at which the corresponding data block (B) ofthe executed query (q) is stored. For instance, data blocks (B₁, B_(N))each include a corresponding query memory level (l_(q)) equal to Level 1indicating that the data blocks (B₁, B_(N)) are stored in Shelter₁.Thus, if the client device 3120 executes a query (q) for either of thedata blocks (B₁, B_(N)), the client device 3120 will send a real query3402 to RAM₂, which corresponds to Shelter₁, residing at the storageabstraction 3200 to retrieve the requested data blocks (B₁, B_(N)). Datablock (B₃) includes a corresponding query memory level (l_(q)) equal toLevel 0 indicating that the data block (B₃) is stored in Shelter0corresponding to RAM₁. Thus, if the client device 3120 executes a query(q) for the data blocks (B₃), the client device 3120 will send a realquery 3402 to RAM₁ residing at the storage abstraction 3200 to retrievethe requested data blocks (B₃).

In some implementations, when query memory level (l_(q)) is not thelowest memory level (l_(l)) (i.e., lq≠l_(l)), the client device 3120updates the memory-level map 3300 to indicate that the retrieved datablock (B) is now stored at the client device 3120 in the virtual memory(Shelter_(l)) of the lowest memory level (l_(l)). In the example shown,when the client device 3120 retrieves a data block (B) from the storageabstraction 3200 (e.g., RAM₁ or RAM₂) having a corresponding querymemory level (l_(q)) less than the lowest memory level (l_(l)), theclient device 3120 stores the retrieved data block (B) locally in theShelter₂ of the memory hardware 3122 and updates the level map 3300 toindicate that the retrieved data block (B) now includes a correspondingquery memory level (l_(q)) equal to Level 2, i.e., the lowest memorylevel (l_(l)).

Referring back to FIG. 3.1A, the client device 3120 may furtherinitialize a shuffle buffer 3330 in the local memory hardware 3122 forshuffling the virtual memory (Shelter_(i)) 3220 of the memory levels(l_(i)). To avoid overflow in the virtual memory (Shelter_(l)) of thelowest memory level (l_(l)) residing at the client device 3120, theshuffle buffer 3330 may shuffle Shelter₁ with Shelter_(l-1).Shelter_(l-1) is the shelter of the next highest level from the lowestmemory level (l_(l)), and thus, resides on the storage abstraction 3200.Here, the client device 3120 may download the data blocks (B) ofshelters Shelter₁ and Shelter_(l-1) and decrypt/re-encrypt the datablocks (B) before shuffling the re-encrypted data blocks (B) accordingto a new randomly selected permutation. Thereafter, the client device3120 uploads the re-permutated data blocks (B) into Shelter_(l-1) on thestorage abstraction 3200.

FIGS. 3.4A and 3.4B provide an example instruction 3400 executing on theclient device 3120 to execute a query (q) for a data block (B_(q)). Thedata block (B_(q)) may be stored either at the client device 3120 or thestorage abstraction 3200 using full recursive square root O-RAM. In theexample shown, each of the multiple memory levels (l_(i)) includephysical memory (RAM_(i)) 3210 and virtual memory (Shelter_(i)) 3220,whereby the virtual memory (Shelter_(l)) 3220 of the lowest memory level(l_(l)) resides on the client device 3120 (e.g., in the memory hardware3122) and the remaining physical memory (RAM_(i)) 3210 and virtualmemory (Shelter_(i)) 3220 reside on the memory hardware 3114 (e.g.,storage abstraction 3200) of the distributed system 3140. Thus,RAM₁-RAM₁ and Shelter₀-Shelter_(l-1) reside on the memory hardware 3114of the distributed system 3140 and Shelter_(l) resides on the clientdevice 3120.

In some implementations, the virtual memory (Shelter₁) 3220 occupies aspace/size on the client device 3120 of S₁ equal to O(1). Additionally,each physical memory (RAM_(i)) 3210 occupies a space/size on the storageabstraction 3200 of N_(i), whereby N_(i) is equal to the value of N₁divided by the constant c to the power i (i.e., N_(i)=N₁/c^(i)).Similarly, each virtual memory (Shelter_(i)-Shelter_(l-1)) 3220 occupiesa space/size on the storage abstraction 3200 of S_(i), whereby S_(i) isequal to the value of N_(i) divided by the constant c (i.e.,S_(i)=N_(i)/c).

In some examples, the distributed system 3140 is configured toinitialize at least one data block (B_(i)) of the corresponding virtualmemory (Shelter_(i)) of at least one memory level (l_(i)) as arespective dummy data block (D_(i)). Here, the respective dummy datablock (D_(i)) may include a permutation of a size of the correspondingdata block (B_(i)), an index (N_(i)) of the corresponding data block(B_(i)), or a memory level number of the corresponding memory level(l_(i)).

FIG. 3.4A shows the data processing hardware 3124 of the client device3120 retrieving a query memory level (l_(q)) corresponding to the datablock (B_(q)) from the memory-level map 3300 when the data processinghardware 3124 executes the query (q) for the data block (B_(q)). Thedata processing hardware 3124 determines that the query memory level(l_(q)) is the lowest memory level (l_(I)), (l_(q)=_(l)) andsubsequently retrieves the data block (B_(q)) from the virtual memory(Shelter_(l)) 3220 of the lowest memory level (l_(l)) residing on theclient device 3120. For instance, the data processing hardware mayretrieve the data block (B_(q)) to perform a get/read operation or toperform an update/write operation on the data block (B_(q)).Additionally, for each memory level (l_(j)) greater than the lowestmemory level (l_(l)) and the physical memory (RAM_(l)) at the lowestmemory level (l_(l)), the data processing hardware 3124 sends acorresponding fake query 3404 to each respective memory level (l_(j)),(l_(l)) to retrieve a corresponding dummy data block (D_(j)) therefrom.In the example shown, the data processing hardware 3124 retrieves thecorresponding dummy data block (D_(j)) from each of the RAM₁-RAM_(l).The client device 3120 retrieves the dummy data blocks (D_(j)) toobfuscate the retrieval of the data block (B_(q)) from the virtualmemory (Shelter_(l)) 3220 on the memory hardware 3122 at the clientdevice 3120. In some examples, the data processing hardware 3124discards the retrieved dummy data blocks (D_(j)).

In some examples, each corresponding dummy data block (D_(j)) of therespective memory level (l_(j)) includes a permutation (π_(j)) of apointer (dCnt_(j)) to a respective data block (N_(j)) at the respectivememory level (l_(j)). The data processing hardware 3124 may incrementthe corresponding pointer (dCnt_(j)) when the corresponding dummy block(D_(j)) is retrieved from the respective memory level (l_(j)) to preventthe data processing hardware 3124 from retrieving the same dummy block(D_(j)) twice.

FIG. 3.4B shows the data processing hardware 3124 of the client device3120 retrieving a query memory level (l_(q)) corresponding to the datablock (B_(q)) from the memory-level map 3300 and determining that theretrieved query memory level (l_(q)) is not the lowest memory level(l_(l)), (l_(q)<l_(l)). Here, the memory-level map 3300 indicates thatthe data block (B_(q)) is not currently stored on the virtual memory(Shelter_(l)) 3220 of the lowest memory level (l_(l)) residing on theclient device 3120. In the example shown, the retrieved query memorylevel (l_(q)) is equal to level 1 indicating that the corresponding datablock (B_(q)) is stored on the physical memory (RAM₂) 3210 at thestorage abstraction 3200 of the distributed system 3140. Accordingly,data processing hardware 3124 sends a real query 3402 to the physicalmemory (RAM₂) 3210 associated with the query memory level (l_(q)) toretrieve the data block (B_(q)). The data processing hardware 3124stores the retrieved data block (B_(q)) in the virtual memory(Shelter_(l)) 3220 of the lowest memory level (l_(l)) residing on theclient device 3120. Thereafter, the data processing hardware 3124 mayupdate the memory-level map 3300 to indicate that the retrieved datablock (B_(q)) is stored in the virtual memory (Shelter_(l)) 3220 of thelowest memory level (l_(l)).

Moreover, for each memory level (l_(j)) other than the query memorylevel (l_(q)) (e.g., RAM₂), the data processing hardware 3124 sends acorresponding fake query 3404 to each respective memory level (l_(j)) toretrieve a corresponding dummy data block (D_(j)) therefrom. In theexample shown, the data processing hardware 3124 retrieves thecorresponding dummy data block (D_(j)) from each of the RAM₁ andRAM₃-RAM_(l). In some examples, the data processing hardware 3124discards the retrieved dummy data blocks (D_(j)). FIG. 3.4B also showsthe data processing hardware 3124 incrementing the corresponding pointer(dCnt_(j)) when the corresponding dummy block (D_(j)) is retrieved fromthe respective memory level (l_(j)) to prevent the data processinghardware 3124 from retrieving the same dummy block (D_(j)) twice.

Referring to FIGS. 3.4A and 3.4B, in some implementations, the dataprocessing hardware 3124 initializes the shuffle buffer 3330 toobliviously shuffle a corresponding virtual memory (Shelter_(i)) 3220 ofeach memory level (l_(i)). In order to obliviously shuffle thecorresponding virtual memory (Shelter_(i)) 3220, the shuffle buffer 3330must also shuffle each of the shelters Shelter_(i+1), Shelter_(i+2), . .. , Shelter_(l). Accordingly, the shuffle buffer 3330 initially shufflesShelter_(l-i) by incorporating Shelter_(l) into Shelter_(l-i) andshuffling Shelter_(l-i) and Shelter_(l) together. Here, the clientdevice 3120 may download the data blocks (B) of shelters Shelter_(l) andShelter_(l-1) and decrypt/re-encrypt the data blocks (B) beforeshuffling the re-encrypted data blocks (B) according to a new randomlyselected permutation. Thereafter, the client device 3120 uploads there-permutated data blocks (B) into Shelter_(l-1) on the storageabstraction 3200. Next, to obliviously shuffle Shelter_(l-2), theshuffle buffer 3330 incorporates Shelter_(l-1) into Shelter_(l-2) andshuffles Shelter_(l-2) and Shelter_(l-1) together. The shuffle buffer3330 repeats this process until Shelter_(i) is obliviously shuffled.

Generally, for any Shelter_(i), an oblivious shuffle must be completeafter each S_(i) queries. Additionally, the last S_(i) queries must beavailable to the client in Shelter_(i). Since a given Shelter_(i)consists of Shelter_(i+1), . . . , Shelter_(l), the S_(i) queries mayappear anywhere in Shelter_(i), . . . , Shelter_(l). In someimplementations, the obliviously shuffling of Shelter_(i) occurs over aperiod of S_(i)/2 queries and the shuffle buffer 3330 stores two shufflebuffers having a size of S_(i)/2 data blocks (B). During a collectionphase, the shuffle buffer 3330 may just store the queried data block(B_(q)). During a work phase, a constant number of steps of obliviouslyshuffling will complete with each query, e.g., oblivious shuffling willterminate before all queries S_(i)/2 occur. The obliviously shufflingwill occur on data that was recently shuffled by the last instance ofobliviously shuffling and the corresponding shuffle buffer 3330. For thevery first instance of obliviously shuffling, the shuffle buffer 3330may use the original data for Shelter₀ and a dummy set of data for allother shelters. After the completion of the obliviously shuffling,Buffer1_(i) of the shuffle buffer 3330 can be emptied to be used again.Simultaneously, the collection phase of a second shuffle occurs and allqueries are stored in Buffer2_(i) as the first shuffle is complete.Accordingly, the shuffled data from the first shuffle is availableduring the work phase of the second shuffle. This pattern may repeat asmore queries arrive.

In some examples, the shuffle buffer 3330 contains multiple versions ofthe same data block (B). For instance, the client device 3120 can querythe same data block (B_(q)) multiple times. However, the shuffle buffer3330 may require at most one updated version of each data block (B). Toresolve the issue of multiple versions of the same data, older datablock accesses may be denoted as dummy data blocks and may be discarded.However, no data blocks (B) are ever discarded from Shelter₀.

In some examples, the total cost of shuffling is calculated as follows.

$\begin{matrix}{{l \cdot N_{2}} + {\sum\limits_{i = 1}^{l}{\frac{N_{2}}{N_{i + 1}}5N_{i}}}} & (1)\end{matrix}$

An amortized cost may be calculated by dividing the total cost by N₂ asfollows.

$\begin{matrix}{l + {\sum\limits_{i = 1}^{l}{5\frac{N_{i}}{N_{i + 1}}}}} & (2)\end{matrix}$

As shown in FIGS. 3.4A and 3.4B, the client device 3120 may execute anencryption module 3342 or access the encryption module 3342 to randomlyselect an Advanced Encryption Standard (AES) key for use in applying therandom permutation on the data blocks (B) as well as encrypting,decrypting, and re-encrypting the data blocks (B). Accordingly, theencryption module 3342 may provide a randomly generated key (e.g., anAES key) for obliviously moving the data blocks (B) to new memorylocations 3118 of the storage abstraction 3200 without revealing thepermutation to the distributed system 3140. In some examples, therandomly generated key is temporary and new keys are randomly generatedeach time the data blocks (B) are re-permutated.

FIG. 3.5 provides an example algorithm 3500 initializing the memorylevels (l_(i)) of the memory hardware 3114, 3122. FIG. 3.6 provides anexample algorithm 3600 for execution of the instruction 3400 at theclient device 3120 to execute a query (q) for a data block (B_(q)).

FIGS. 3.7A and 3.7B illustrate a method 3700 for obliviously executingqueries for data blocks (B). At block 3702, the method 3700 includesexecuting, by data processing hardware 3124, an instruction 3400 toexecute a query (q) for a data block (B). At 704, the method 3700includes obtaining, by the data processing hardware 3124, a query memorylevel (l_(q)) corresponding to the data block (B) from a memory-levelmap 3300. The memory-level map 3300 maps memory levels (l_(i)) of memory3114, 3112, each memory level (l_(i)) including physical memory(RAM_(i)) 3210 and virtual memory (Shelter_(i)) 3220. The virtual memory(Shelter_(l)) 3220 of a lowest memory level (l_(l)) resides on a clientdevice 3120 and the remaining physical memory (RAM_(i)) 3210 and virtualmemory (Shelter_(i)) 3220 reside on memory hardware 3114 of adistributed system 3140 in communication with the data processinghardware 3124.

At block 3706, the method 3700 includes determining, by the dataprocessing hardware 3124, whether the query memory level (l_(q)) is thelowest memory level (l_(l)), (l_(q)=l_(l)). At block 3708, when thequery memory level (l_(q)) is the lowest memory level (l_(l)),(l_(q)=l_(l)), the method 3700 includes retrieving, by the dataprocessing hardware 3124, the data block (B) from the virtual memory(Shelter_(l)) 3220 of the lowest memory level (l_(l)). For each memorylevel (l_(j)) greater than the lowest memory level (l_(l)) and thephysical memory (RAM_(l)) 3210 at the lowest memory level (l_(l)), themethod 3700 includes, at block 3710, retrieving, by the data processinghardware 3124, a corresponding dummy data block (D_(j)) from therespective memory level (l_(j)), (l_(l)) and, at block 712, discarding,by the data processing hardware 3124, the retrieved dummy data block(D_(j)).

On the other hand, when the query memory level (l_(q)) is not lowestmemory level (l_(l)), (l_(q)=l_(l)), the method 3700 includes, at block3714, retrieving, by the data processing hardware 3124, the data block(B) from the query memory level (l_(q)) and, at block 3716, storing theretrieved data block (B) in the virtual memory (Shelter_(l)) 3220 of alowest memory level (l_(l)).

At block 3718, for each memory level (l_(i)) other than the query memorylevel (l_(q)), the method 3700 includes retrieving, by the dataprocessing hardware 3124, the corresponding dummy block (D_(j)) from therespective memory level (l_(j)). At block 3720, the method includesdiscarding, by the data processing hardware 3124, the retrieved dummydata block (D_(j)).

FIG. 3.8 is schematic view of an example computing device 3800 that maybe used to implement the systems and methods described in this document.The computing device 3800 is intended to represent various forms ofdigital computers, such as laptops, desktops, workstations, personaldigital assistants, servers, blade servers, mainframes, and otherappropriate computers. The components shown here, their connections andrelationships, and their functions, are meant to be exemplary only, andare not meant to limit the various implementations described and/orclaimed in this document.

The computing device 3800 includes a processor 3810 (e.g., dataprocessing hardware 3112), memory 3820, a storage device 3830, ahigh-speed interface/controller 3840 connecting to the memory 3820 andhigh-speed expansion ports 3850, and a low speed interface/controller3860 connecting to low speed bus 3870 and storage device 3830. Thecomputing device 3800 may reside at the client device 3120 and/or thedistributed system 3140. Each of the components 3810, 3820, 3830, 3840,3850, and 3860, are interconnected using various busses, and may bemounted on a common motherboard or in other manners as appropriate. Theprocessor 3810 can process instructions for execution within thecomputing device 3800, including instructions stored in the memory 3820or on the storage device 3830 to display graphical information for agraphical user interface (GUI) on an external input/output device, suchas display 3880 coupled to high speed interface 3840. In otherimplementations, multiple processors and/or multiple buses may be used,as appropriate, along with multiple memories and types of memory. Also,multiple computing devices 3800 may be connected, with each deviceproviding portions of the necessary operations (e.g., as a server bank,a group of blade servers, or a multi-processor system).

The memory 3820 (e.g., memory hardware) stores informationnon-transitorily within the computing device 3800. The memory 3820 maybe a computer-readable medium, a volatile memory unit(s), ornon-volatile memory unit(s). The non-transitory memory 3820 may bephysical devices used to store programs (e.g., sequences ofinstructions) or data (e.g., program state information) on a temporaryor permanent basis for use by the computing device 3800. Examples ofnon-volatile memory include, but are not limited to, flash memory andread-only memory (ROM)/programmable read-only memory (PROM)/erasableprogrammable read-only memory (EPROM)/electronically erasableprogrammable read-only memory (EEPROM) (e.g., typically used forfirmware, such as boot programs). Examples of volatile memory include,but are not limited to, random access memory (RAM), dynamic randomaccess memory (DRAM), static random access memory (SRAM), phase changememory (PCM) as well as disks or tapes.

The storage device 3830 is capable of providing mass storage for thecomputing device 3800. In some implementations, the storage device 3830is a computer-readable medium. In various different implementations, thestorage device 3830 may be a floppy disk device, a hard disk device, anoptical disk device, or a tape device, a flash memory or other similarsolid state memory device, or an array of devices, including devices ina storage area network or other configurations. In additionalimplementations, a computer program product is tangibly embodied in aninformation carrier. The computer program product contains instructionsthat, when executed, perform one or more methods, such as thosedescribed above. The information carrier is a computer- ormachine-readable medium, such as the memory 3820, the storage device3830, or memory on processor 3810.

The high speed controller 3840 manages bandwidth-intensive operationsfor the computing device 3800, while the low speed controller 3860manages lower bandwidth-intensive operations. Such allocation of dutiesis exemplary only. In some implementations, the high-speed controller3840 is coupled to the memory 3820, the display 3880 (e.g., through agraphics processor or accelerator), and to the high-speed expansionports 3850, which may accept various expansion cards (not shown). Insome implementations, the low-speed controller 3860 is coupled to thestorage device 3830 and low-speed expansion port 3870. The low-speedexpansion port 3870, which may include various communication ports(e.g., USB, Bluetooth, Ethernet, wireless Ethernet), may be coupled toone or more input/output devices, such as a keyboard, a pointing device,a scanner, or a networking device such as a switch or router, e.g.,through a network adapter.

The computing device 3800 may be implemented in a number of differentforms, as shown in the figure. For example, it may be implemented as astandard server 3800 a or multiple times in a group of such servers 3800a, as a laptop computer 3800 b, or as part of a rack server system 3800c.

SECTION 4: Oblivious Access with Differential Privacy

While oblivious random access memory (O-RAM) may conceal client accesspatterns to client-owned and client-encrypted data stored on untrustedmemory, widespread deployment of O-RAM is restricted due the largebandwidth overhead and/or large client storage requirements associatedwith O-RAM. In many scenarios, security guarantees of O-RAM that ensurethat data contents and access patterns remain completely hidden, are toostrong. For example, it may be pointless to conceal information about anaccess pattern that may have been leaked through other channels (e.g., apriori knowledge about the user/client of the data). Thus, if only asmall set of queries are in fact sensitive, hiding the entire accesssequence is also unnecessary. Implementations herein are directed towardusing differentially private access to data blocks stored on untrustedmemory in order to achieve exponentially smaller bandwidth overhead byrelaxing some unnecessary security requirements. Differentially privateaccess may be used with O-RAM and oblivious storage (OS) for obliviouslyexecuting queries for data blocks stored on untrusted memory managed bya service provider. The untrusted memory may induce a storageabstraction overlaid across multiple memory locations of a distributedsystem (e.g., cloud environment) and a client may store encrypted datablocks across the memory locations. The untrusted memory may also storepublically-known data blocks that is not encrypted. In these scenarios,differentially private access may be used with private informationretrieval (PIR) to conceal the access patterns of the publically-knownand un-encrypted data from the untrusted memory.

FIGS. 4.1A and 4.1B depict an example system 4100 for storing N datablocks (B) 4102 owned by a client 4104 on a distributed system 4140 andusing differentially private access to oblivious execute queries for thedata blocks (B) 4102 to conceal access patterns while preserving searchfunctionalities on the data blocks 4102 by the client 4104. A clientdevice 4120 (e.g., a computer) associated with the client 4104communicates, via a network 4130, with the distributed system 4140having a scalable/elastic non-transitory storage abstraction 4150. Theclient device 4120 may include associated memory hardware 4122 andassociated data processing hardware 4124. The storage abstraction 4150(e.g., key/value store, file system, data store, etc.) is overlain onstorage resources 4114 to allow scalable use of the storage resources4114 by one or more client devices 4120.

The system 4100 may optionally store publically-known and un-encrypted Ndata blocks 4102 across one or more storage resource 4114. Thus, theclient device 4120 may not own the data blocks 4102 and the content ofthe data blocks 4102 are available to the public in configurations.However, the use of differentially private access may similarly hideaccess patterns when the data blocks 4102 are retrieved from the one ormore storage resource 4114.

In some implementations, the distributed system 4140 executes acomputing device 4112 that manages access to the storage abstraction4150. For instance, the client device 4120 may encrypt and store thedata blocks 4102 on the storage abstraction 4150, as well as retrieveand decrypt the data blocks 4150 from the storage abstraction 4150.While the example shown depicts the system 4100 having a trusted sideassociated with the client device 4120 in communication, via the network4130, with an untrusted side associated with the distributed system4140, the system 4100 may be alternatively implemented on a largeintranet having a trusted computing device(s) (CPU) and untrusted datastorage. The untrusted side associated with the distributed system 4140or data storage is considered “honest-but-curious”, in that thecomputing device 4112 follows the protocol honestly but may perform anyprobabilistically polynomial time algorithm using information leaked bythe distributed system 4140 to gain additional insight.

In some implementations, the distributed system 4100 includes resources4110, 4110 a-z. The resources 4110 may include hardware resources andsoftware resources. The hardware resources 4110 may include computingdevices 4112 (also referred to as data processing devices and dataprocessing hardware) or non-transitory memory 4114 (also referred to asmemory hardware and storage resources). The software resources 4110 mayinclude software applications, software services, applicationprogramming interfaces (APIs) or the like. The software resources 4110may reside in the hardware resources 4110. For example, the softwareresources 4110 may be stored in the memory hardware 4114 or the hardwareresources 4110 (e.g., the computing devices 4112) may be executing thesoftware resources 4110.

A software application (i.e., a software resource 4110) may refer tocomputer software that causes a computing device to perform a task. Insome examples, a software application may be referred to as an“application,” an “app,” or a “program.” Example applications include,but are not limited to, system diagnostic applications, systemmanagement applications, system maintenance applications, wordprocessing applications, spreadsheet applications, messagingapplications, media streaming applications, social networkingapplications, and gaming applications.

The memory hardware 4114, 4122 may be physical devices used to storeprograms (e.g., sequences of instructions) or data (e.g., program stateinformation) on a temporary or permanent basis for use by a computingdevice 4112 and/or a client device 4120 (i.e., the data processinghardware 4124 of the client device 4120). The memory hardware 4114, 4122may be volatile and/or non-volatile addressable semiconductor memory.Examples of non-volatile memory include, but are not limited to, flashmemory and read-only memory (ROM)/programmable read-only memory(PROM)/erasable programmable read-only memory (EPROM)/electronicallyerasable programmable read-only memory (EEPROM) (e.g., typically usedfor firmware, such as boot programs). Examples of volatile memoryinclude, but are not limited to, random access memory (RAM), obliviousrandom access memory (ORAM), dynamic random access memory (DRAM), staticrandom access memory (SRAM), phase change memory (PCM) as well as disksor tapes.

The network 4130 may include various types of networks, such as localarea network (LAN), wide area network (WAN), and/or the Internet.Although the network 4130 may represent a long range network (e.g.,Internet or WAN), in some implementations, the network 4130 includes ashorter range network, such as a local area network (LAN). In someimplementations, the network 4130 uses standard communicationstechnologies and/or protocols. Thus, the network 4130 can include linksusing technologies, such as Ethernet, Wireless Fidelity (WiFi) (e.g.,802.11), worldwide interoperability for microwave access (WiMAX), 3G,Long Term Evolution (LTE), digital subscriber line (DSL), asynchronoustransfer mode (ATM), InfiniBand, PCI Express Advanced Switching,Bluetooth, Bluetooth Low Energy (BLE), etc. Similarly, the networkingprotocols used on the network 4130 can include multiprotocol labelswitching (MPLS), the transmission control protocol/Internet protocol(TCP/IP), the User Datagram Protocol (UDP), the hypertext transportprotocol (HTTP), the simple mail transfer protocol (SMTP), the filetransfer protocol (FTP), etc. The data exchanged over the network 4130can be represented using technologies and/or formats including thehypertext markup language (HTML), the extensible markup language (XML),etc. In addition, all or some of the links can be encrypted usingconventional encryption technologies, such as secure sockets layer(SSL), transport layer security (TLS), virtual private networks (VPNs),Internet Protocol security (IPsec), etc. In other examples, the network4130 uses custom and/or dedicated data communications technologiesinstead of, or in addition to, the ones described above.

The data blocks 4102 correspond to atomic units of data and each havesize B bytes each. For example, a typical value for B for storage on adistributed system may be 64 KB to 256 B. A notation N denotes a totalnumber of the data blocks 4102 associated with the client 4104 (orassociated with the storage resource(s) 4114 in private informationretrieval) and stored on the storage abstraction 4150 using ObliviousRandom Access Memory (O-RAM) or Oblivious Storage (OS). Described ingreater detail below, OS may use the same framework (i.e., transcriptand security definition) as O-RAM except that OS considers a naturalextension where the data blocks 4102 are identified by unique stringidentifiers instead of simple index identifiers as used by O-RAM. Thus,N may refer to the capacity of the O-RAM or the OS on the storageabstraction 4150. Each of the N data blocks 4102 is stored at acorresponding memory location 4118, 4118A-N (FIG. 4.1B) of the storageabstraction 4150 overlain across the memory hardware 4114. In someimplementations, the N data blocks 4102 are associated with privateinformation retrieval (PIR) storage whereby the N data blocks 4102 arestored on one or more storage resources 4114 and are un-encrypted andavailable to the public.

While traditional encryption schemes provide confidentiality, thetraditional encryption schemes are ineffective at hiding data accesspatterns which may reveal very sensitive information to the untrusteddistributed system 4140. Moreover, the traditional encryption schemesallow the client 4104 to search for encrypted data 4102 stored on thedistributed system 4140 only if the client 4104 provides plain textaccess for the data 4102 to the distributed system 4140. As the clientdevice 4120 originates the data 4102, the client device 4120 isconsidered trusted.

In some implementations, the client device 4120 and the distributedsystem 4140 execute an oblivious permutation routine 4450 for obliviousmoving the encrypted data blocks 4102 around the storage abstraction4150 to completely hide data access patterns (which data blocks 4102were read/written) from the distributed system 4140. For instance, theoblivious permutation routine 4450 may cause the distributed system 4140to allocate new memory locations 4118 of the storage abstraction 4150for storing re-permutated N data blocks 4102 arranged in an array, A,and/or organize/divide/partition the storage abstraction 4150 intomultiple data buckets 4350. In some implementations, the obliviouspermutation routine 4450 organizes the storage abstraction 4150 into Ndata buckets 4350 each containing θ(log log N) memory locations 4118such that each data bucket 4350 can store both one or more real datablocks 4102 and one or more dummy data blocks 4103. In theseimplementations, the storage abstraction 4150 includes a total capacityequal to θ(N log log N).

At the trusted side, the client device 4120 may iteratively download twodata buckets 4350 at a time from the distributed system 4140 using apair of pseudorandom functions F₁, F₂ and corresponding identifiers idand allocates a block stash 4370 on the memory hardware 4122 whileexecuting the oblivious permutation routine 4450. For each data bucket4350 received, the client device 4120 decrypts and applies a randompermutation on the data blocks 4102 within the corresponding data bucket4350 to generate permutated data blocks and determines a correspondingbuffer bucket 4360 for each permutated data block 4102. Additionaldetails executing the oblivious permutation routine for obliviouslymoving the encrypted data blocks 4102 around the storage abstraction4150 can be found in U.S. Patent Application 62/490,804, filed on Apr.27, 2017, which is hereby incorporated by reference in its entirety. Insome implementations, the client device 4120 further initializes anoblivious shuffle in the local memory hardware 4122 by downloading thedata blocks 4102 from the pair of buckets 4350 and decrypt/re-encryptthe data blocks 4102 before shuffling the re-encrypted data blocks 4102accordingly to a new randomly selected permutation using newly selectedpseudorandom functions F′₁, F′₂. Thereafter, the client device 4120uploads the re-permutated data blocks 4102 to the corresponding bufferbuckets 4360 based on the newly selected pseudorandom functions F′₁,F′₂. The old buckets 4350 may be deleted after the shuffle is complete.This oblivious shuffle may occur when the oblivious permutation routine4450 executes on the client device 4120 and the distributed system 4140.Additional details of obliviously shuffling N data blocks 4102 aroundthe storage abstraction 4150 can be found in U.S. Patent Application62/508,523, filed on May 19, 2017, which is hereby incorporated byreference in its entirety.

In some implementations, when the client device 4120 needs to access(read/write) an encrypted data block 4102 stored on the storageabstraction 4150, the data processing hardware 4124 at the client device4120 executes an instruction 4300, 4400 to execute a query (q) for thedata block 4102. By executing the instruction 4300, 4400, the clientdevice 4120 is able to retrieve the data block 4102 without revealingthe contents of the data block 4102 as well as the sequence of the query(q) executed by the client device 4120 to the distributed system 4140.The query (q) consists of two phases: (1) a download phase; and (2) anoverwrite phase so that the distributed system 4140 is unaware whetherthe corresponding operation is a read or write. Further, execution ofthe instruction 4300, 4400 obviates which data blocks 4102 wereread/written from the distributed system 4140. Execution of theinstruction 4300, 4400 requires two roundtrips between the client device4120 and the distributed system 4140 when the client device 4120executes the corresponding query (q) for the data block 4102. Forinstance, since each query (q) includes the download phase and theoverwrite phase, the contents of an overwrite block associated with awrite operation does not depend on the content of a downloaded blockduring a download phase. Hence, the two blocks can be requested usingone round-trip and the second round-trip may be used to upload theoverwrite block back to storage abstraction 4150.

Referring to FIG. 4.1B, in some implementations, the distributed storagesystem 4140 includes loosely coupled memory hosts 4110, 4110 a-z (e.g.,computers or servers), each having a computing resource 4112 (e.g., oneor more processors or central processing units (CPUs)) in communicationwith storage resources 4114 (e.g., memory hardware, memory hardware,flash memory, dynamic random access memory (DRAM), phase change memory(PCM), and/or disks) that may be used for caching data. The storageabstraction 4150 overlain on the storage resources 4114 allows scalableuse of the storage resources 4114 by one or more client devices 4120,4120 a-n. The client devices 4120 may communicate with the memory hosts4110 through the network 4130 (e.g., via remote procedure calls (RPC)).

In some implementations, the distributed storage system 4140 is“single-sided,” eliminating the need for any server jobs for respondingto real and/or fake queries 4302,4402/4304, 4404 from client devices4120 to retrieve data blocks 4102 and/or dummy data blocks 4103 from thestorage abstraction 4150 when the client device 4120 executesinstructions 4300, 4400 to execute queries (q) for data blocks 4102.“Single-sided” refers to the method by which most of the requestprocessing on the memory hosts 4110 may be done in hardware rather thanby software executed on CPUs 4112 of the memory hosts 4110. Additionalconcepts and features related to a single-sided distributed cachingsystem can be found in U.S. Pat. No. 9,164,702, which is herebyincorporated by reference in its entirety.

The distributed system 4140 may obliviously move data blocks 4102 aroundthe storage resources 4114 (e.g., memory hardware) of the remote memoryhosts 4110 (e.g., the storage abstraction 4200) and get the data blocks4102 from the remote memory hosts 4110 via RPCs or via remote directmemory access (RDMA)-capable network interface controllers (NIC) 4116. Anetwork interface controller 4116 (also known as a network interfacecard, network adapter, or LAN adapter) may be a computer hardwarecomponent that connects a computing device/resource 4112 to the network4130. Both the memory hosts 4110 a-z and the client device 4120 may eachhave a network interface controller 4116 for network communications. Theinstructions 4300, 4400 and/or the oblivious permutation routine 4450executing on the physical processor 4112 of the hardware resource 4110registers a set of remote direct memory accessible regions/locations4118A-N of the memory 4114 with the network interface controller 4116.Each memory location 4118 is configured to store a corresponding datablock 4102.

In some implementations, when the client device 4120 executes theinstruction 4300, 4400 to execute the query (q) for a data block 4102and determines that the data block 4102 is stored locally on the blockstash 4370 at the memory hardware 4122 of the client device 4120, theclient device 4120 retrieves the data block 4102 from the block stash4370 and sends a fake query 4304, 4404 to the NIC 4116 for retrieving arandom block 4102 (or random data buckets 4350 including real and/orfake blocks 4102, 4103) to conceal the retrieval of the data block 4102from the block stash 4370 at the local memory hardware 4122. The clientdevice 4120 may discard the random block 4102 downloaded from the fakequery 4304, 4404. On the other hand, if the client device 4120determines that the data block 4102 is stored on the storage abstraction4150, the client device 4120 may send a real query 4302, 4402 to the NIC4116 for retrieving the corresponding data block 4102 from the storageabstraction 4150.

FIGS. 4.2A and 4.2B provide an example differentiallyprivate-information information retrieval (DP-IR) instruction 4200executing on the client device 4120 to execute a download request 4202,4204 for a data block 4102 stored on one or more colluding storageresources 4114 (FIG. 4.2A) or one of multiple non-colluding storageresources (FIG. 4.2B). Unlike O-RAM and OS, the contents of the N datablocks 4102 are assumed to be known by all parties including anyadversaries. In this case, the untrusted server generates the N datablocks before providing access to client devices 4120. Typically, PIRclient devices 4120 are stateless since the data blocks 4102 areu_(n)-encrypted and their memory locations are publically-available.

For a single server 4110 (e.g., single storage resource 4114) generatingand storing the N data blocks 4102, FIG. 4.2A shows the client device4120 executing the DP-IR instruction 4200 to download block B₃ 4102 fromthe storage resource 4114 a. Here, block B₃ corresponds to one of nine Nblocks B₁-B₉ stored on the single storage resource 4114 a. The clientdevice 4120 may call out the index i (e.g., i=1, 2, 3 . . . , or 9)associated with the queried block 4102. The DP-IR instruction 4200includes differential privacy having a security parameter, ε, for aconstant error probability, α, that is asymptotically tight to a lowerbound. The security parameter ε may be greater than or equal to zero andthe error probability α may be greater than zero. In order to concealthe access pattern for the downloaded block B₃, the DP PIR instruction4200 disguises real queries by executing a download request 4202 withprobability α for K blocks excluding block B₃ and another downloadrequest 4204 with probability 1−α for the block B₃ and K−1 other blocks.Hence, each download request 4202, 4204 is requesting exactly K blocksof bandwidth among the N data blocks 4102 stored on the storage resource4114. The download requests 4202, 4204 may occur in any order to concealthe fact that block B₃ is the actual queried-for block B₃ the clientdevice 4120 wants to download. The value of K is based on a function ofthe security parameter ε and the error probability α. For instance, Kmay be expressed as follows.

$\begin{matrix}{K = {{K\left( {\varepsilon,\alpha} \right)} = \frac{\left( {1 - \alpha} \right)N}{\alpha\left( {e^{\varepsilon} - 1} \right)}}} & (1)\end{matrix}$

In the single-server example, the client device 4120 receives a firstdownload sequence 4212 associated with error probability α returning theK blocks B₁, B₂, B₅ excluding the queried-for block B₃ and a seconddownload sequence 4214 associated with the error probability 1−α for theblock B₃ and the K−1 other blocks B₆, B₉. The second download sequence4214 may be received by the client device 4120 before or after receivingthe first download sequence 4212. The K blocks B₁, B₂, B₅ returned inthe first download sequence 4212 associated error probability α and theK−1 other blocks B₆, B₉ returned in the second download sequence 4214associated with error probability 1−α may each be uniformly selected atrandom by the DP-IR instruction 4200 executing on the client device4120.

In some implementations, an entity or organization operating multipleservers 4110, 4110 a-n (e.g., two more storage resources 4114, 4114 a-neach associated with a respective server 4110) includes one of theservers corrupting a fraction t of the servers. In this situation toconceal the access patterns by the client device 4120 when downloadingdata blocks 4102 from the various storage resources 4114 a-n colludingwith one another, FIG. 4.2A shows the client device 4120 executing theDP-IR instruction 4200 to download block B₃ (or another block B_(i)) bysending the download requests 4202, 4204 to a uniformly at random chosenstorage resource 4114 instead of splitting up and evenly requesting theblock B₃ from all of the colluding storage resources 4114 a-n.Accordingly, in order to conceal the access pattern for the downloadedblock B₃ in the multiple colluding server setting, the DP PIRinstruction 4200 disguises real queries sent to the uniformly at randomchosen storage resource 4114 by executing the download request 4202 withprobability α for K blocks excluding block B₃ and the other downloadrequest 4204 with probability 1−α for the block B₃ and K−1 other blocks.In response to receiving each of the download requests 4202, 4204 fromthe client device, the uniformly at random chosen storage resource 4114returns the corresponding download sequence 4212 associated with errorprobability α for the K blocks B₁, B₂, B₅ excluding the queried-forblock B₃ and the corresponding download sequence 4214 associated withthe error probability 1−α for the block B₃ and the K−1 other blocks B₆,B₉ in the same manner as discussed above with respect to the singleserver setting.

Referring to FIG. 4.2B, the client device 4120 queries for a data blockB_(q) 4102 from one of multiple non-colluding servers 4110 (e.g., two ormore storage resources 4114) that are mutually distrusting, andtherefore do no share information with one another. For instance, thenon-colluding servers 4110 may be owned by separate entities accessibleto the client devices 4120 but not sharing information with one anotherdue to contractual obligations or other reasons. Each non-colludingserver 4110 may be associated with a non-interacting adversary such thateach server 4110 may monitor all memory accesses patterns performed onits corresponding storage resource 4114. In order to conceal the accesspattern for the downloaded block B_(q), the DP PIR instruction 4200disguises real queries by executing a corresponding download request4224 sent to each of the non-colluding storage resources 4114 thatrequests to download exactly c random blocks of bandwidth from eachstorage resource 4114. For the storage resource 4114 storing thequeried-for block B_(q), the corresponding download request 4224 is forthe queried-for block B_(q) and c−1 other blocks. For the remainingstorage resources 4114, each corresponding download request 4224 is forc blocks excluding the queried-for block B_(q). The value of c for eachnon-colluding storage resource 4114 is based a security parameter ε, thetotal number of non-colluding servers D, and the corresponding number ofN data blocks 4102 stored on each storage resource 4114. For instance,for each non-colluding storage resource 4114, c may be expressed asfollows.

$\begin{matrix}{c = \frac{N}{e^{\varepsilon}\left( {D - 1} \right)}} & (2)\end{matrix}$

In some implementations, O-RAM allows the client device 4120 to storeclient-owned and client-encrypted data blocks 4102 privately oncorresponding memory locations 4118 across the storage abstraction 4150of the distributed system 4140. By contrast to the DP-IR of examplesFIGS. 4.2A and 4.2B, the data blocks 4102 stored in O-RAM are encryptedby the client device 4120 using private keys and the memory location4118 associated with each data block 4102 is hidden from the untrusteddistributed system 4140. FIGS. 4.3A-4.3D show an example differentiallyprivate-oblivious random access memory (DP-ORAM) instruction 4300executing on the client device 4120 to execute a query (q) to access(read/write) an encrypted data block 4102 stored on the storageabstraction 4150 without revealing the contents of the data block 4102as well as the sequence of the query (q) executed by the client device4120 to the distributed system 4140. The query (q) consists of twophases: (1) a download phase; and (2) an overwrite phase so that thedistributed system 4140 is unaware whether the corresponding operationis a read or write as well as revealing a miss when a queried-for datablock B_(i) does not exist. The DP-ORAM instruction 4300 executing onthe client device 4120 (e.g., on the data processing hardware 4124) mayfirst generate private keys K, K₁, K₂ of length k using an encryptionmodule 4305, initialize an array A on the storage abstraction 4150 of Nempty block slots (e.g., empty memory locations 4118), and initializethe block stash 4370 on the memory hardware 4122 of the client device4122. Each empty block slot of the array A may include a correspondingindex A_(i). Each empty block slot may optionally be initially filledwith a dummy block (e.g., a block with encryption equal to zero).

In some examples, the client device 4120 and the distributed system 4140execute the oblivious permutation routine 4450 to cause the distributedsystem 4140 to allocate new memory locations 4118 of the storageabstraction 4150 for storing permutated or re-permutated data blocks4102 and organize/divide/partition the storage abstraction 4150 intomultiple M data buckets 4350, 4350A-n. Each data bucket 4350 may store aspecified number of the N data blocks 4102. In some examples, the datablocks 4102 are randomly assigned to each data bucket 4350 bypseudorandom permutations π performed at the client device 4120 during aprevious oblivious permutation routine 4450 so that the division of thestorage abstraction 4150 into the M data buckets 4350 isobscure/oblivious to the untrusted distributed system 4140. The smallerdata buckets 4350 subdivide the O-RAM of the storage abstraction 4150 toincrease bandwidth when the distributed system 4140 and the clientdevice 4120 are performing permutation operations during execution ofthe oblivious permutation routine 4450 and the instruction 4300. Thenumber of M data buckets 4350 initialized at the distributed system 4140is tunable based on security and/or bandwidth requirements.

The block stash 4370 occupies a space/size/capacity equal to C on thememory hardware 4122 of the client device 4120 and each data block 4102has a probability p of being stored in the block stash 4370 (in additionto the storage abstraction 4150). The capacity C of the block stash 4370is tunable based on security and/or bandwidth requirements. Forinstance, increasing the capacity C of the block stash 4370 increasessecurity at the cost of increased bandwidth. The probability p of a datablock being stored in block stash 4370 may be expressed as follows.

$\begin{matrix}{p < \frac{C}{N}} & (3)\end{matrix}$

The DP-ORAM instruction 4300 further causes the client device 4120 toencrypt each data block 4102 using the private keys K and iterativelyupload each encrypted data block B_(i) 4102 to a corresponding randomlyselected empty block slot A_(i) on the storage abstraction 4150 based ona permutation π so that the actual location of each encrypted data block4102 is hidden from the distributed system 4140. Moreover, as the datablocks 4102 are encrypted on the trusted side by the client device 4120using client-owned private keys K, the contents of the N data blocks4102 stored on the storage abstraction 4150 are also unknown to thedistributed system 4150. The client device 4120 may simply access acorresponding data block 4102 stored on the storage abstraction 4150 byapplying the permutation π along with a corresponding index i associatedwith the requested data block 4102.

Referring to FIG. 4.3A, the data processing hardware 4124 executes thequery (q) for a data block (B_(i)) 4102 during the download phase whenthe data block (B_(i)) 4102 is stored in the block stash 4370 on thememory hardware 4122 of the client device 4120. B_(i) may correspond toany of the N data blocks 1-16 encrypted and stored on the array A of thestorage abstraction 4150. Since the data block B_(i) 4102 is stored inthe block stash 4370 with probability p, the data processing hardware4124 removes the requested data block (B_(i)) 4102 from the block stash4370 and sends a fake query 4304 to the untrusted distributed system4140 to download some random data block 4102 stored on the storageabstraction 4150 to obfuscate the retrieval of the data block (B_(i))from the block stash 4370. In the example shown, the fake query 4304randomly selects and downloads Block 11 from the third data bucket 4350c of the array A of N blocks 4102 stored on the storage abstraction4150. Here, the fake query 4304 requests A[j] from the storageabstraction 4150, with j (e.g., j is equal “11” in the example shown)chosen uniformly at random. Upon receiving the downloaded data block(e.g., Block 11) from the fake query 4304, the data processing hardware4124 may simply discard the data block 4102 since the client device 4120is merely downloading the block at random to obfuscate the actualretrieval of the data block (B_(i)) from the block stash 4370. Thus, theuntrusted distributed system 4140 is unaware whether or not theretrieved block (e.g., Block 11) is downloaded in response to a realquery 4302 or the fake query 4304. The data processing hardware 4124 mayexecute a read operation or a write operation on the data block (B_(i))retrieved from the block stash 4370 and one of store the current versionof the data block (B_(i)) in the block stash 4370 with probability p orin the storage abstraction 4150 during the overwrite phase.

On the other hand, FIG. 4.3B shows the data processing hardware 4124executing the query (q) for the data block (B_(i)) 4102 during thedownload phase when the data block (B₁) is not stored locally in theblock stash 4370 on the memory hardware 4122 of the client device 4120.Since the data block B_(i) 4102 is not stored in the block stash 4370,the data processing hardware 4124 sends a real query 4302 to theuntrusted distributed system 4140 to download the data block B₁ storedon the storage abstraction 4150. In the example shown, B_(i) correspondsto block 6 in the second data bucket 4350 b of the storage abstraction4150. Here, the real query 4302 requests A[i] from the storageabstraction 4150, with i (e.g., i is equal to “6” in the example shown)corresponding to the index/identifier of the data block (B_(i)) 4102 theclient device 4120 wants to access. In response toretrieving/downloading the data block B_(i) 4102 from the real query4302, the data processing hardware 4124 decrypts the block B_(i). Forinstance, the data processing hardware 4124 may access the private keysK stored locally on the encryption module 4305 to decrypt the contentsof block 6. The client device 4120 may hold (e.g., in memory hardware4122) the retrieved block B_(i) (e.g., block 6).

Referring to FIG. 4.3C, the data processing hardware 4124 stores acurrent version of a data block (B_(i)′) in the block stash 4370 withprobability p on the memory hardware 4122 of the client device 4120during an overwrite phase. The overwrite phase follows a correspondingdownload phase in which the previous version of the data block (B_(i))was retrieved either from the block stash 4370 (FIG. 4.3A) or from thestorage abstraction 4150 (FIG. 4.3B). In some examples, the clientdevice 4124 executes a write operation on the data block (B_(i))retrieved during the download phase to update the data block with a newversion (B_(i)′). As used herein, updating the previous version of Biwith the new version B_(i)′ may include replacing and discarding theprevious version B₁ with the new version B_(i)′. In these examples, theupdated new version (B_(i)′) is stored on in the block stash 4370 withprobability p during the overwrite phase. In other examples, the clientdevice 4120 simply executes a read operation on the data block (B₁)retrieved during the download phase. In these examples, the currentversion stored in the block stash 4370 is unchanged from the versionretrieved during the download phase.

In order to obfuscate the storing of the current version of the datablock (B_(i)′) in the block stash 4370 with probability p from theuntrusted distributed system 4140, the data processing hardware 4124sends another fake query 4304 to the untrusted distributed system 4140to download some random data block 4102 stored on the storageabstraction 4150. In the example shown, the fake query 4304 randomlyselects and downloads Block 8 from the second data bucket 4350 b of thearray A of N blocks 4102 stored on the storage abstraction 4150. Here,the fake query 4304 requests A[/] from the storage abstraction 4150,with j (e.g., j is equal “8” in the example shown) chosen uniformly atrandom. Upon receiving downloaded data block (e.g., Block 8) from thefake query 4304, the data processing hardware 4124 decrypts andre-encrypts the block with random freshness and then uploads there-encrypted data block (e.g., Block 8) back onto the storageabstraction 4150 of the distributed system 4140. Here, the dataprocessing hardware 4124 simply re-encrypts the data block (e.g., Block8) without changing the contents so that the distributed system 4140 isunaware whether or not block was uploaded in response to a fake query4304 or a real query 4302 for read/write access. Put another way, thedata processing hardware 4124 has no way of knowing whether there-encrypted data block 4102 includes updated content as a result of anoverwrite or whether the content is unchanged.

On the other hand, when the current version of a data block (B_(i)′) isnot stored in the block stash 4370, FIG. 4.3D shows the client device4120 holding the current version of the data block (B_(i)′) (e.g., inthe memory hardware 4122) while the data processing hardware 4124 sendsa real query 4302 to the untrusted distributed system 4140 to retrievethe corresponding data block (B_(i)) (e.g., Block 6) from the storageabstraction 4150. Thereafter, the data processing hardware 4124 encryptsand uploads the current version of the data block (B_(i)′) to thedistributed system 4140 for storage on the storage abstraction 4150 anddiscards the previous version of the corresponding data block (B_(i))retrieved from the real query 4302. In some examples, the currentversion of the data block (B_(i)′) corresponds to a new version of Block6 updated by the client device 4120 after executing a write operation onthe previous version of data block (B_(i)) retrieved during the downloadphase. In other examples, when the client device 4120 only executes aread operation on the data block (B_(i)) retrieved during the downloadphase, the current version of the data block (B_(i)′) (e.g., Block 6)uploaded to the distributed system 4140 may remain unchanged from thecorresponding discarded data block B, except with a freshly computedciphertext (e.g., a different encryption). Thus, the untrusteddistributed system 4140 is unware whether or not the contents of theuploaded current version of data block (B_(i)′) were changed since theclient device 4120 freshly encrypted the data block (B_(i)′) locallyusing private keys.

Whereas the O-RAM construction of FIGS. 4.3A-4.3D requires each of the Ndata blocks 4102 outsourced by the client 4104 to have a unique blockidentifier i, the oblivious storage (OS) construction allows the datablocks 4102 to be identified by strings. Moreover, OS protocols musthandle operations (read/write) that refer to identifiers notcorresponding to any currently stored block so that an adversary cannotlearn whether operations refer to currently stored data blocks 4102 onthe storage abstraction 4150 or non-existing data blocks (i.e., blockmisses). In some implementations, the DP-ORAM construction/protocolconverts to the DP-OS construction/protocol by storing a position map onthe client device 4120 (e.g., in the memory hardware 4122) that assignsa unique index from [N] to each of the N blocks. Here, the position maptranslates each block identifier to a corresponding index to allow therest of a query to follow exactly as the previously discussed DP-ORAM.These implementations, however, can be impractical due to a large amountof client-side storage required to store the position map. To alleviatethe client from having to store a one-to-one position map of blockidentifiers (e.g., strings) to corresponding indexes, implementationsherein are directed toward using pseudorandom functions (PRFs) totranslate block identifiers to indexes from a small domain. As PRFsrequire storage of a single key, the storage requirements for the clientare significantly reduced compared to storing a position map.

FIGS. 4.4A-4.4C show an example differentially private-oblivious storage(DP-OS) instruction 4400 executing on the client device 4120 toinitialize the client device 4120 and the distributed system 4140 forstoring the N data blocks 4102 in encrypted form on the storageabstraction 4150. FIGS. 4.5A-4.5D show the client device 4120 executingthe DP-OS instruction 4400 to execute a query (q) to access (read/write)one of the encrypted data blocks 4102 stored on the storage abstraction4150 without revealing the contents of the data block 4102 as well asthe sequence of the query (q) executed by the client device 4120 to thedistributed system 4140.

Referring to FIG. 4.4A, execution of the DP-OS instruction 4400 by thedata processing hardware 4124 causes the client device 4120 to encrypteach of the N data blocks 4102 using one or more private keys obtainedfrom the encryption module 4305, initialize the block stash 4370 on thememory hardware 4122 of the client device 4122, and store a sub-set ofthe encrypted data blocks 4102 in the block stash 4370 with probabilityp. The probability p may be expressed using EQ. 3 discussed above. Aswith ORAM, the block stash 4370 at the client device 4120 has a capacityof O(C) blocks of storage which may be tunable based on security andbandwidth requirements. The client device 4120 (e.g., the dataprocessing hardware 4124), when executing the instruction 4400,additionally initializes an identifier stash 4372 for storing the uniquestring identifiers id corresponding to each data block 4102 stored inthe block stash 4370.

Each data block 4102 includes a corresponding identifier id expressed asa string. During initialization of the DP-OS, the instruction 4400further causes the client device 4120 to generate PRFs F₁, F₂ randomlywhile the distributed system 4140 initializes N buckets 4350, 4350A-Nwith labels 1-N each with exactly m memory slots for storingcorresponding encrypted blocks 4102, 4103. In the example shown, thenumber of memory slots m for each bucket 4350 is expressed as follows.

m=θ(log log N)  (4)

Accordingly, each memory slot m in a corresponding bucket 4350 stores areal data block 4102 in encrypted form or a dummy data block 4103 inencrypted form. When the N buckets 4350 are initialized, each bucket4350 may be initially filled with dummy blocks 4103. Metadata andcontents of each block 4102, 4103 will be stored together and each block4102, 4103 may include a corresponding tag indicating whether the blockis real or fake (i.e., a dummy). The distributed system 4140 may store aposition map 4355 of N pairs of bucket identifiers and denote PosMap[i]as the i-th pair.

The client device 4120 is further configured to store the encryptionkey(s) for encrypting/decrypting the data blocks 4102 as well as thePRFs F₁, F₂ that each require the storage of additional keys K₁, K₂. Forconvenience, instead of using F₁(K₁,x) and F₂(K₂,x) the key parametermay be dropped. As will become apparent, the use of the PRFs F₁, F₂generated by the client device 4120 and stored thereon ensure that adata block B_(i) with identifier id_(i) will always be in one of twobuckets labelled F₁(id_(i)) and F₂(id_(i)) or stored in the block stash4370. As used herein, F(id_(i)) refers to the pair (F₁(id_(i)),F₂(id_(i))) for convenience.

After encrypting the blocks, initializing the N buckets 4350A-N, andgenerating the PRFs F₁, F₂ at random, the instruction 4400 causes thedata processing hardware 4124 to iterate through each of the N datablocks 4102 for obliviously storage on the storage abstraction 4150 ofthe distributed system 4140. For a current iteration corresponding toplacement of data block (B_(i)), FIG. 4.4B shows the data processinghardware 4124 using the PRFs F₁, F₂ to return/download a pair of databuckets 4350 with indices s₁=F₁(id_(i)) and s₂=F₂(id_(i)) and thendecrypting all of the blocks 4102, 4103 within the downloaded databuckets s₁, s₂ to determine which of the two buckets is the leastloaded. As used herein, a least loaded bucket refers to the data buckethaving the least amount of real data blocks 4102. In the example shown,the data bucket s₂ is least loaded because the data bucket s₁ includes agreater number real data blocks 4102 (e.g., data bucket s₁ includes onereal data block 4102 and data bucket S₂ includes zero real data blocks4102). Accordingly, the data processing hardware 4124 replaces one ofthe dummy blocks 4103 from the least loaded bucket S₂ with the datablock (B_(i)) of the current iteration. The replaced dummy block 4103may be discarded. If, on the other hand, each of the downloaded databuckets s₁, s₂ include an equal number of dummy blocks 4103, the clientdevice 4120 may randomly choose either bucket for input of the datablock (B_(i)) 4102.

In some scenarios, and particularly in later iterations as the databuckets 4350 are becoming full of real data blocks 4102, the two bucketss₁=F₁(id_(i)) and s₂=F₂(id_(i)) for a present iteration may not includeany dummy blocks 4103, thereby rendering the buckets completely full andequally loaded with real data blocks 4102. In these scenarios, theinstruction 4400 will simply fail and terminate such that two newbuckets will be downloaded to identify a least-loaded bucket forinputting the data block (Bi) presently being processed.

FIG. 4.4C shows the data processing hardware 4124 re-encrypting all ofthe blocks 4102, 4103 within the downloaded buckets s₁, s₂ with freshrandomness and then re-uploading the buckets s₁, s₂ back to thedistributed system 4140 at the same positions within the storageabstraction 4150. With probability p, B_(i) may be stored in the blockstash 4370. For the remaining probability (i.e., 1−(C/N)), B_(i) isdiscarded. The distributed system 4140 may further sets the position mapPosMap[i] equal to F(id_(i)) with F(id_(i)) referring to the pair(F₁(id_(i)), F₂(id_(i))).

After initializing the DP-OS by obliviously storing the N data blocks4102 in encrypted form on the storage abstraction 4150 and storing thesubset of data blocks 4102 in the block stash 4370 with probability p,FIG. 4.5A shows the data processing hardware 4124 executing theinstruction 4400 to execute the query (q) for a data block (B_(i)) 4102during the download phase when the data block (B_(i)) 4102 is stored inthe block stash 4370 on the memory hardware 4122 of the client device4120. The query (q) includes the identifier id for the block B_(i) aswell as the operation (read/write) for the block. A new blockrepresenting a current version may also be included with the query (q)when the operation is a write operation. Here, the data processinghardware 4124 queries the block stash 4370 to determine the data blockB_(i) 4102 is stored therein or the data processing hardware 4124queries the identifier stash 4372 to locate the corresponding identifierid (e.g., string) associated with the data block B_(i) 4102. The dataprocessing hardware 4124 removes the data block B_(i) 4102 from theblock stash 4370. Since the data block B_(i) 4102 is stored in the blockstash 4370 (and/or the id is stored in the identifier stash 4372) withprobability p, the data processing hardware 4124 sends a fake query 4404to the untrusted distributed system 4140 to download two random databuckets 4350 stored on the storage abstraction 4150 to obfuscate theretrieval of the data block (B_(i)) from the block stash 4370. In theexample shown, the fake query 4404 randomly downloads bucket₁ andbucket₃. The client device 4120 may simply discard the two randomlydownloaded buckets 4350 (e.g., bucket₁ and bucket₃) and their respectivecontents.

On the other hand, FIG. 4.5B shows the data processing hardware 4124executing the query (q) for the data block (B_(i)) 4102 during thedownload phase when neither the data block (B_(i)) is stored in thelocal block stash 4370 nor the corresponding identifier id is inidentifier stash 4372 of the client device 4120. Since the data blockB_(i) 4102 is not stored in the block stash 4370 (nor is the identifierid in the identifier stash 4372), the data processing hardware 4124sends a real query 4402 to the untrusted distributed system 4140 todownload the pair of data buckets 4350 with indices s₁=F₁(id_(i)) ands₂=F₂(id_(i)) and then decrypts all of the blocks 4102, 4103 within thedownloaded data buckets s₁, s₂ to determine if the data block (B_(i)) isstored in one of the buckets s₁, s₂. The data processing hardware 4124may decrypt all of the blocks 4102, 4103 within each of the buckets byaccessing the private keys locally stored on the encryption module 4305.In the example shown, the data processing hardware 4124 finds andremoves the data block (B_(i)) from the downloaded bucket s₁. Theremoved data block (B_(i)) may be temporarily stored on the clientdevice 4120 in the memory hardware 4122 and the remaining blocks 4102,4103 from each downloaded bucket s₁, s₂ may be discarded. In somescenarios (not shown), the query 4402 for the block (B_(i)) results in amiss when the block (B_(i)) is not found in the returned buckets s₁, s₂.In these scenarios, the overwrite phase includes the client device 4120executing a fake overwrite upon two randomly chosen buckets so that theclient device 4120 does not reveal the miss of the non-existent block(B_(i)) to the untrusted distributed system 4140.

Referring to FIG. 4.5C, in some implementations, when the query 4402 forthe block (B_(i)) during the download phase of FIG. 4.5B results in themiss indicating that block (B_(i)) does not exist, the data processinghardware 4124 adds the identifier id associated with the miss to theidentifier stash 4372. In order to obfuscate the addition of theidentifier id to the identifier stash 4372 and not reveal thenon-existence of block (B_(i)) to the untrusted distributed system 4140,the data processing hardware 4124 sends a fake query 4404 to theuntrusted distributed system 4140 to download two random data buckets4350 (e.g., bucket₁ and bucket₃) stored on the storage abstraction 4150.The data processing hardware 4124 then decrypts and re-encrypts all ofthe blocks 4102, 4103 within the randomly downloaded buckets with freshrandomness before uploading the buckets (e.g., bucket₁ and bucket₃) backto the distributed system 4140 at the same positions within the storageabstraction 4150. The downloading, decrypting, and re-encrypting on thetwo random buckets is referred to as a fake overwrite to conceal theblock miss from the distributed system 4140 because the contents of therandomly downloaded buckets (e.g., bucket₁ and bucket₃) have not beenchanged (except with a freshly computed ciphertext (e.g., a differentencryption)). Thus, the untrusted distributed system 4140 is unawarewhether or not the retrieved data buckets (e.g., bucket₁ and bucket₃)are downloaded in response to a real query 4402 or the fake query 4404.

In other implementations, when the data block (B_(i)) does exist, FIG.4.5C also shows the data processing hardware 4124 storing a currentversion of the data block (B_(i)) in the block stash 4370 withprobability p on the memory hardware 4122 of the client device 4120during the overwrite phase. The overwrite phase follows a correspondingdownload phase in which the data block (B_(i)) was retrieved either fromthe block stash 4370 (FIG. 4.5A) or from the storage abstraction 4150(FIG. 4.5B). In some examples, the client device 4124 executes a writeoperation on the data block (B_(i)) retrieved during the download phaseto update the data block (B_(i)) with a new version of the data block(B_(i)′). In these examples, the updated new version of the data block(B_(i)′) is stored on in the block stash 4370 with probability p duringthe overwrite phase. In other examples, the client device 4120 simplyexecutes a read operation on the data block (B_(i)) retrieved during thedownload phase. In these examples, the current version stored in theblock stash 4370 is unchanged from the version retrieved during thedownload phase.

In order to obfuscate the storing of the current version of the datablock (B_(i)′) in the block stash 4370 with probability p from theuntrusted distributed system 4140, the data processing hardware 4124sends the fake query 4404 to the untrusted distributed system 4140 todownload two random data buckets 4350 (e.g., bucket₁ and bucket₃) storedon the storage abstraction 4150. The data processing hardware 4124 thendecrypts and re-encrypts all of the blocks 4102, 4103 within therandomly downloaded buckets with fresh randomness before uploading thebuckets (e.g., bucket₁ and bucket₃) back to the distributed system 4140at the same positions within the storage abstraction 4150. Thedownloading, decrypting, and re-encrypting on the two random buckets isreferred to as a fake overwrite to conceal the storing of the currentversion of the data block (B_(i)′) in the block stash 4370 because thecontents of the randomly downloaded buckets (e.g., bucket₁ and bucket₃)have not been changed (except with a freshly computed ciphertext (e.g.,a different encryption)). Thus, the untrusted distributed system 4140 isunaware whether or not the retrieved data buckets (e.g., bucket₁ andbucket₃) are downloaded in response to a real query 4402 or the fakequery 4404.

On the other hand, when the current version of the data block data block(B_(i)′) is not stored in the block stash 4370 with the remainingprobability 1−(C/N), FIG. 4.5D shows the client device 4120 holding thecurrent version of the data block (B_(i)′) (e.g., in the memory hardware4122) while the data processing hardware 4124 sends a real query 4402 tothe untrusted distributed system 4140 to download the pair of databuckets 4350 with indices s₁=F₁(id_(i)) and s₂=F₂(id_(i)). Uponreceiving the data buckets s₁, s₂, the data processing hardware 4124decrypts all of the blocks 4102, 4103, replaces the previous version ofthe data block (B_(i)) in the corresponding one of the buckets s₁, s₂with the new version of the data block (B_(i)′), and re-encrypts all ofthe blocks 4102, 4103 including the new version of the data block(B_(i)′) within data buckets s₁, s₂ with fresh randomness. The dataprocessing hardware 4124 then re-uploads the buckets s₁, s₂ back to thedistributed system 4140 at the same positions within the storageabstraction 4150.

In order to keep the size of the block stash 4370 small, after the DP-OSinstruction 4400 executes θ(N log N) queries (q), the instruction 4400may use a block shuffle (e.g., by executing the oblivious permutationroutine 4450) to refresh the system by randomly choosing new seeds (K′₁,K′₂) (i.e., by generating to new PRFs F₁′, F₂′ and resetting theidentifier stash 4372) and reallocating blocks 4102 to buffer buckets4360 based on the new seeds. Here, the distributed system 4140 maintainsa list of the keys associated with each data block 4102. Thus, for eachkey, the two buckets 4350 associated with keys (K₁, K₂) are downloaded,the blocks 4102, 4103 are decrypted to locate and re-encrypt thecorresponding data block 4102. Thereafter, the two buffer buckets 4360associated with keys (K′₁, K′₂) are downloaded, decrypted, and the datablock 4102 is added to the least loaded of the two buckets 4350 beforere-encrypting and re-uploading the two buckets 4350 back to thedistributed system 4140. Accordingly, after the instruction 4400executes N queries (q), the shuffle buffer initializes new block andidentifier stashes 4370, 4372, moves all the data blocks 4102 from theold buckets 4350 into the new data buckets 4360 based on the new PRFsF₁′, F₂′, and deletes the old data buckets 4350. The client device 4120may use the PosMap stored on the data processing hardware 4124 whenexecuting the shuffle buffer.

In some implementations, the DP-OS uses a hashing scheme of overlappingL buckets with each of the N data blocks 4102 associated with a uniquefinite string identifier k₁-k_(n) and hashed into one of L buckets. TheL buckets may be outsourced to the untrusted distributed system 4140 andeach bucket may include a same size so that no information about thevalues of the identifiers k₁-k_(n) can be inferred by the distributedsystem 4140. The hashing scheme is configured to hide the values of theidentifiers k₁-k_(n) for the data blocks 4102. The hashing scheme mayuse a binary tree or a reverse exponential tree, with leaf nodesoccupying level 0 and levels increasing toward a root of the tree. Theroot of the tree occupies the largest level of the tree.

For a binary tree with N≤L≤2N leafs, each node of the tree may storeexactly one block 4102. The tree may be initially filled with dummyblocks 4103, such as blocks with encryptions of zero. The leafs of thetree can be numbered from left to right from one to L, and each leaf maycorrespond to one of the L buckets. Here, the i-th bucket may includeall blocks stored in nodes on the unique path from the i-th leaf to theroot of the tree. Additionally, the client device 4120 may optionallykeep a block stash 4370 to store blocks that overflow from the tree.FIG. 4.6 provides an example algorithm 4600 initializing the binary treeby inputting the data blocks 4102 in encrypted form into corresponding Lbuckets and executing a query (q) for a data block (B_(i)).

A reverse exponential tree may be parameterized by the number of datablocks stored N and the number of choices D. FIG. 4.7 shows an examplereverse exponential tree 4700 with N=7 data blocks and D=2 choices. Thenumber of children at each level doubly exponentially increases whentraversing up the tree. For L levels, all nodes have at most C₁:=Dchildren at level 1 and all nodes have at most C₂=(C₁)²:=D² children atlevel 2. At level i, all nodes have at mostC_(i)=(C_(i−1))²:=(D²)^(i-1). There will be no leaf nodes at level zero.All levels i greater than zero may be expressed as follows.

$\begin{matrix}{{N}_{i}{:=\left\lbrack \frac{N}{D^{2^{i - 1}}} \right\rbrack}} & (4)\end{matrix}$

The tree may stop after each level has exactly one node, which occurs atlevel [log₂ log_(D) N]. Each node at level i is labelled left to rightfrom 1 to N_(i). At levels i greater than or equal to one, node j∈{1, .. . , N_(i)} will have C_(i) children nodes labelled with (j−1). C_(i)+1to j·C_(i) at level i+1. Each node N_(i) at each level i greater than orequal to zero might have less than C₁ children due to rounding. Thereverse exponential tree further includes N buckets with the i-th bucket(1≤i≤N) including all nodes on the unique path from root to the leafnode labelled with i. The client device 4120 may optionally store ablock stash 4370 to store overflow blocks 4102. FIG. 4.8 provides anexample algorithm 4800 initializing the reverse exponential tree byinputting the data blocks 4102 in encrypted form into corresponding Nbuckets and executing a query (q) for a data block (B_(i)).

FIG. 4.9 is schematic view of an example computing device 4900 (e.g.,data processing hardware) that may be used to implement the systems andmethods described in this document. The computing device 4900 isintended to represent various forms of digital computers, such aslaptops, desktops, workstations, personal digital assistants, servers,blade servers, mainframes, and other appropriate computers. Thecomponents shown here, their connections and relationships, and theirfunctions, are meant to be exemplary only, and are not meant to limitthe various implementations described and/or claimed in this document.

The computing device 4900 includes a processor 4910, memory 4920, astorage device 4930, a high-speed interface/controller 4940 connectingto the memory 4920 and high-speed expansion ports 4950, and a low speedinterface/controller 4960 connecting to low speed bus 4970 and storagedevice 4930. Each of the components 4910, 4920, 4930, 4940, 4950, and4960, are interconnected using various busses, and may be mounted on acommon motherboard or in other manners as appropriate. The processor4910 can process instructions for execution within the computing device4900, including instructions stored in the memory 4920 or on the storagedevice 4930 to display graphical information for a graphical userinterface (GUI) on an external input/output device, such as display 4980coupled to high speed interface 4940. In other implementations, multipleprocessors and/or multiple buses may be used, as appropriate, along withmultiple memories and types of memory. Also, multiple computing devices4900 may be connected, with each device providing portions of thenecessary operations (e.g., as a server bank, a group of blade servers,or a multi-processor system).

The memory 4920 stores information non-transitorily within the computingdevice 4900. The memory 4920 may be a computer-readable medium, avolatile memory unit(s), or non-volatile memory unit(s). Thenon-transitory memory 4920 may be physical devices used to storeprograms (e.g., sequences of instructions) or data (e.g., program stateinformation) on a temporary or permanent basis for use by the computingdevice 4900. Examples of non-volatile memory include, but are notlimited to, flash memory and read-only memory (ROM)/programmableread-only memory (PROM)/erasable programmable read-only memory(EPROM)/electronically erasable programmable read-only memory (EEPROM)(e.g., typically used for firmware, such as boot programs). Examples ofvolatile memory include, but are not limited to, random access memory(RAM), dynamic random access memory (DRAM), static random access memory(SRAM), phase change memory (PCM) as well as disks or tapes.

The storage device 4930 (e.g. memory hardware) is capable of providingmass storage for the computing device 4900. In some implementations, thestorage device 4930 is a computer-readable medium. In various differentimplementations, the storage device 4930 may be a floppy disk device, ahard disk device, an optical disk device, or a tape device, a flashmemory or other similar solid state memory device, or an array ofdevices, including devices in a storage area network or otherconfigurations. In additional implementations, a computer programproduct is tangibly embodied in an information carrier. The computerprogram product contains instructions that, when executed, perform oneor more methods, such as those described above. The information carrieris a computer- or machine-readable medium, such as the memory 4920, thestorage device 4930, or memory on processor 4910.

The high speed controller 4940 manages bandwidth-intensive operationsfor the computing device 4900, while the low speed controller 4960manages lower bandwidth-intensive operations. Such allocation of dutiesis exemplary only. In some implementations, the high-speed controller4940 is coupled to the memory 4920, the display 4980 (e.g., through agraphics processor or accelerator), and to the high-speed expansionports 4950, which may accept various expansion cards (not shown). Insome implementations, the low-speed controller 4960 is coupled to thestorage device 4930 and low-speed expansion port 4970. The low-speedexpansion port 4970, which may include various communication ports(e.g., USB, Bluetooth, Ethernet, wireless Ethernet), may be coupled toone or more input/output devices, such as a keyboard, a pointing device,a scanner, or a networking device such as a switch or router, e.g.,through a network adapter.

The computing device 4900 may be implemented in a number of differentforms, as shown in the figure. For example, it may be implemented as astandard server 4900 a or multiple times in a group of such servers 4900a, as a laptop computer 4900 b, or as part of a rack server system 4900c.

A software application (i.e., a software resource) may refer to computersoftware that causes a computing device to perform a task. In someexamples, a software application may be referred to as an “application,”an “app,” or a “program.” Example applications include, but are notlimited to, system diagnostic applications, system managementapplications, system maintenance applications, word processingapplications, spreadsheet applications, messaging applications, mediastreaming applications, social networking applications, and gamingapplications.

The non-transitory memory may be physical devices used to store programs(e.g., sequences of instructions) or data (e.g., program stateinformation) on a temporary or permanent basis for use by a computingdevice. The non-transitory memory may be volatile and/or non-volatileaddressable semiconductor memory. Examples of non-volatile memoryinclude, but are not limited to, flash memory and read-only memory(ROM)/programmable read-only memory (PROM)/erasable programmableread-only memory (EPROM)/electronically erasable programmable read-onlymemory (EEPROM) (e.g., typically used for firmware, such as bootprograms). Examples of volatile memory include, but are not limited to,random access memory (RAM), dynamic random access memory (DRAM), staticrandom access memory (SRAM), phase change memory (PCM) as well as disksor tapes.

Various implementations of the systems and techniques described here canbe realized in digital electronic and/or optical circuitry, integratedcircuitry, specially designed ASICs (application specific integratedcircuits), computer hardware, firmware, software, and/or combinationsthereof. These various implementations can include implementation in oneor more computer programs that are executable and/or interpretable on aprogrammable system including at least one programmable processor, whichmay be special or general purpose, coupled to receive data andinstructions from, and to transmit data and instructions to, a storagesystem, at least one input device, and at least one output device.

These computer programs (also known as programs, software, softwareapplications or code) include machine instructions for a programmableprocessor, and can be implemented in a high-level procedural and/orobject-oriented programming language, and/or in assembly/machinelanguage. As used herein, the terms “machine-readable medium” and“computer-readable medium” refer to any computer program product,non-transitory computer readable medium, apparatus and/or device (e.g.,magnetic discs, optical disks, memory, Programmable Logic Devices(PLDs)) used to provide machine instructions and/or data to aprogrammable processor, including a machine-readable medium thatreceives machine instructions as a machine-readable signal. The term“machine-readable signal” refers to any signal used to provide machineinstructions and/or data to a programmable processor.

Implementations of the subject matter and the functional operationsdescribed in this specification can be implemented in digital electroniccircuitry, or in computer software, firmware, or hardware, including thestructures disclosed in this specification and their structuralequivalents, or in combinations of one or more of them. Moreover,subject matter described in this specification can be implemented as oneor more computer program products, i.e., one or more modules of computerprogram instructions encoded on a computer readable medium for executionby, or to control the operation of, data processing apparatus. Thecomputer readable medium can be a machine-readable storage device, amachine-readable storage substrate, a memory device, a composition ofmatter effecting a machine-readable propagated signal, or a combinationof one or more of them. The terms “data processing apparatus”,“computing device” and “computing processor” encompass all apparatus,devices, and machines for processing data, including by way of example aprogrammable processor, a computer, or multiple processors or computers.The apparatus can include, in addition to hardware, code that creates anexecution environment for the computer program in question, e.g., codethat constitutes processor firmware, a protocol stack, a databasemanagement system, an operating system, or a combination of one or moreof them. A propagated signal is an artificially generated signal, e.g.,a machine-generated electrical, optical, or electromagnetic signal, thatis generated to encode information for transmission to suitable receiverapparatus.

A computer program (also known as an application, program, software,software application, script, or code) can be written in any form ofprogramming language, including compiled or interpreted languages, andit can be deployed in any form, including as a stand-alone program or asa module, component, subroutine, or other unit suitable for use in acomputing environment. A computer program does not necessarilycorrespond to a file in a file system. A program can be stored in aportion of a file that holds other programs or data (e.g., one or morescripts stored in a markup language document), in a single filededicated to the program in question, or in multiple coordinated files(e.g., files that store one or more modules, sub programs, or portionsof code). A computer program can be deployed to be executed on onecomputer or on multiple computers that are located at one site ordistributed across multiple sites and interconnected by a communicationnetwork.

The processes and logic flows described in this specification can beperformed by one or more programmable processors executing one or morecomputer programs to perform functions by operating on input data andgenerating output. The processes and logic flows can also be performedby, and apparatus can also be implemented as, special purpose logiccircuitry, e.g., an FPGA (field programmable gate array) or an ASIC(application specific integrated circuit).

Processors suitable for the execution of a computer program include, byway of example, both general and special purpose microprocessors, andany one or more processors of any kind of digital computer. Generally, aprocessor will receive instructions and data from a read only memory ora random access memory or both. The essential elements of a computer area processor for performing instructions and one or more memory devicesfor storing instructions and data. Generally, a computer will alsoinclude, or be operatively coupled to receive data from or transfer datato, or both, one or more mass storage devices for storing data, e.g.,magnetic, magneto optical disks, or optical disks. However, a computerneed not have such devices. Moreover, a computer can be embedded inanother device, e.g., a mobile telephone, a personal digital assistant(PDA), a mobile audio player, a Global Positioning System (GPS)receiver, to name just a few. Computer readable media suitable forstoring computer program instructions and data include all forms ofnon-volatile memory, media and memory devices, including by way ofexample semiconductor memory devices, e.g., EPROM, EEPROM, and flashmemory devices; magnetic disks, e.g., internal hard disks or removabledisks; magneto optical disks; and CD ROM and DVD-ROM disks. Theprocessor and the memory can be supplemented by, or incorporated in,special purpose logic circuitry.

To provide for interaction with a user, one or more aspects of thedisclosure can be implemented on a computer having a display device,e.g., a CRT (cathode ray tube), LCD (liquid crystal display) monitor, ortouch screen for displaying information to the user and optionally akeyboard and a pointing device, e.g., a mouse or a trackball, by whichthe user can provide input to the computer. Other kinds of devices canbe used to provide interaction with a user as well; for example,feedback provided to the user can be any form of sensory feedback, e.g.,visual feedback, auditory feedback, or tactile feedback; and input fromthe user can be received in any form, including acoustic, speech, ortactile input. In addition, a computer can interact with a user bysending documents to and receiving documents from a device that is usedby the user; for example, by sending web pages to a web browser on auser's client device in response to requests received from the webbrowser.

One or more aspects of the disclosure can be implemented in a computingsystem that includes a backend component, e.g., as a data server, orthat includes a middleware component, e.g., an application server, orthat includes a frontend component, e.g., a client computer having agraphical user interface or a Web browser through which a user caninteract with an implementation of the subject matter described in thisspecification, or any combination of one or more such backend,middleware, or frontend components. The components of the system can beinterconnected by any form or medium of digital data communication,e.g., a communication network. Examples of communication networksinclude a local area network (“LAN”) and a wide area network (“WAN”), aninter-network (e.g., the Internet), and peer-to-peer networks (e.g., adhoc peer-to-peer networks).

The computing system can include clients and servers. A client andserver are generally remote from each other and typically interactthrough a communication network. The relationship of client and serverarises by virtue of computer programs running on the respectivecomputers and having a client-server relationship to each other. In someimplementations, a server transmits data (e.g., an HTML, page) to aclient device (e.g., for purposes of displaying data to and receivinguser input from a user interacting with the client device). Datagenerated at the client device (e.g., a result of the user interaction)can be received from the client device at the server.

While this specification contains many specifics, these should not beconstrued as limitations on the scope of the disclosure or of what maybe claimed, but rather as descriptions of features specific toparticular implementations of the disclosure. Certain features that aredescribed in this specification in the context of separateimplementations can also be implemented in combination in a singleimplementation. Conversely, various features that are described in thecontext of a single implementation can also be implemented in multipleimplementations separately or in any suitable sub-combination. Moreover,although features may be described above as acting in certaincombinations and even initially claimed as such, one or more featuresfrom a claimed combination can in some cases be excised from thecombination, and the claimed combination may be directed to asub-combination or variation of a sub-combination.

Similarly, while operations are depicted in the drawings in a particularorder, this should not be understood as requiring that such operationsbe performed in the particular order shown or in sequential order, orthat all illustrated operations be performed, to achieve desirableresults. In certain circumstances, multi-tasking and parallel processingmay be advantageous. Moreover, the separation of various systemcomponents in the embodiments described above should not be understoodas requiring such separation in all embodiments, and it should beunderstood that the described program components and systems cangenerally be integrated together in a single software product orpackaged into multiple software products.

A number of implementations have been described. Nevertheless, it willbe understood that various modifications may be made without departingfrom the spirit and scope of the disclosure. Accordingly, otherimplementations are within the scope of the following claims. Forexample, the actions recited in the claims can be performed in adifferent order and still achieve desirable results.

What is claimed is:
 1. A computer-implemented method when executed ondata processing hardware causes the data processing hardware to performoperations comprising: receiving, from a first user device, encrypteddata encrypted locally at the first user device by a customer side keystored on the first user device, the customer side key kept secret fromthe data processing hardware; storing, on memory hardware incommunication with the data processing hardware, the encrypted data;receiving, from a second user device, a request to access the encrypteddata stored on the memory hardware, the request comprising a user token;determining, using the user token, that the second user device isallowed to access the encrypted data; and in response to determiningthat the second user device is allowed to access the encrypted data,providing the encrypted data to the second user device.
 2. Thecomputer-implemented method of claim 1, wherein the operations furthercomprise receiving a search query for a keyword in the encrypted data,the search query comprising a cryptographic search value based on a readkey for the encrypted data, the keyword, and a cryptographic keyassociated with the first user device.
 3. The computer-implementedmethod of claim 2, wherein the encrypted data comprises a dataidentifier identifying the encrypted data.
 4. The computer-implementedmethod of claim 3, wherein the search query further comprises the dataidentifier identifying the encrypted data.
 5. The computer-implementedmethod of claim 3, wherein: the encrypted data comprises a set ofdocuments; and the search query comprises a different cryptographicsearch value for each document in the set of documents.
 6. Thecomputer-implemented method of claim 1, wherein the second user deviceis configured to, after receiving the encrypted data, decrypt theencrypted data locally at the second user device.
 7. Thecomputer-implemented method of claim 1, wherein the user token comprisesa read access token or a write access token.
 8. The computer-implementedmethod of claim 1, wherein the operations further comprise recording acryptographic word set token in a word set for each unique pair of wordsthat appears in the encrypted data.
 9. The computer-implemented methodof claim 1, wherein the encrypted data comprises one or more of:documents; emails; calendar events; notes; or database entries.
 10. Thecomputer-implemented method of claim 1, wherein the first user device isconfigured to send the customer side key required to decrypt theencrypted data to the second user device to give the second user deviceaccess to decrypt the encrypted data.
 11. A system comprising: dataprocessing hardware; and memory hardware in communication with the dataprocessing hardware, the memory hardware storing instructions that whenexecuted on the data processing hardware cause the data processinghardware to perform operations comprising: receiving, from a first userdevice, encrypted data encrypted locally at the first user device by acustomer side key stored on the first user device, the customer side keykept secret from the data processing hardware; storing, on memoryhardware in communication with the data processing hardware, theencrypted data; receiving, from a second user device, a request toaccess the encrypted data stored on the memory hardware, the requestcomprising a user token; determining, using the user token, that thesecond user device is allowed to access the encrypted data; and inresponse to determining that the second user device is allowed to accessthe encrypted data, providing the encrypted data to the second userdevice.
 12. The system of claim 11, wherein the operations furthercomprise receiving a search query for a keyword in the encrypted data,the search query comprising a cryptographic search value based on a readkey for the encrypted data, the keyword, and a cryptographic keyassociated with the first user device.
 13. The system of claim 12,wherein the encrypted data comprises a data identifier identifying theencrypted data.
 14. The system of claim 13, wherein the search queryfurther comprises the data identifier identifying the encrypted data.15. The system of claim 13, wherein: the encrypted data comprises a setof documents; and the search query comprises a different cryptographicsearch value for each document in the set of documents.
 16. The systemof claim 11, wherein the second user device is configured to, afterreceiving the encrypted data, decrypt the encrypted data locally at thesecond user device.
 17. The system of claim 11, wherein the user tokencomprises a read access token or a write access token.
 18. The system ofclaim 11, wherein the operations further comprise recording acryptographic word set token in a word set for each unique pair of wordsthat appears in the encrypted data.
 19. The system of claim 11, whereinthe encrypted data comprises one or more of: documents; emails; calendarevents; notes; or database entries.
 20. The system of claim 11, whereinthe first user device is configured to send the customer side keyrequired to decrypt the encrypted data to the second user device to givethe second user device access to decrypt the encrypted data.