Skip to main content
Erschienen in: International Journal of Information Security 6/2017

02.09.2016 | Regular Contribution

rPIR: ramp secret sharing-based communication-efficient private information retrieval

verfasst von: Lichun Li, Michael Militzer, Anwitaman Datta

Erschienen in: International Journal of Information Security | Ausgabe 6/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Even as data and analytics-driven applications are becoming increasingly popular, retrieving data from shared databases poses a threat to the privacy of their users. For example, investors/patients retrieve records about stocks/diseases they are interested in from a stock/medical database. Knowledge of such interest is sensitive information that the database server would have access to, unless some mitigating measures are deployed. Private information retrieval (PIR) is a promising security primitive to protect the privacy of users’ interests. PIR allows the retrieval of a data record from a database without letting the database server know which record is being retrieved. The privacy guarantees could either be information theoretic or computational. Alternatively, anonymizers, which hide the identities of data users, may be used to protect the privacy of users’ interests for some situations. In this paper, we study rPIR, a new family of information-theoretic PIR schemes using ramp secret sharing. We have designed four rPIR schemes, using three ramp secret sharing approaches, achieving answer communication costs close to the cost of non-private information retrieval. Evaluation shows that, for many practical settings, rPIR schemes can achieve lower communication costs and the same level of privacy compared with traditional information-theoretic PIR schemes and anonymizers. Efficacy of the proposed schemes is demonstrated for two very different scenarios (outsourced data sharing and P2P content delivery) with realistic analysis and experiments. In many situations of these two scenarios, rPIR’s advantage of low communication cost outweighs its disadvantages, which results in less expenditure and/or better quality of service compared with what may be achieved if traditional information-theoretic PIR and anonymizers are used.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chaabane, A., Acs, G., Kaafar, M.A.: You are what you like! Information leakage through users’ interests. In: NDSS (2012) Chaabane, A., Acs, G., Kaafar, M.A.: You are what you like! Information leakage through users’ interests. In: NDSS (2012)
2.
Zurück zum Zitat Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: FOCS (1995) Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: FOCS (1995)
3.
Zurück zum Zitat Syverson, P.F., Goldschlag, D.M., Reed, M.G.: Anonymous connections and onion routing. In: S&P (1997) Syverson, P.F., Goldschlag, D.M., Reed, M.G.: Anonymous connections and onion routing. In: S&P (1997)
4.
Zurück zum Zitat Chor, B., Gilboa, N., Naor, M.: Private information retrieval by keywords. Technical report, TR CS0917, Department of Computer Science, Technion (1997) Chor, B., Gilboa, N., Naor, M.: Private information retrieval by keywords. Technical report, TR CS0917, Department of Computer Science, Technion (1997)
5.
Zurück zum Zitat Reardon, J., Pound, J., Goldberg, I.: Relational-complete private information retrieval. Technical report, CACR 34 (2007), University of Waterloo (2007) Reardon, J., Pound, J., Goldberg, I.: Relational-complete private information retrieval. Technical report, CACR 34 (2007), University of Waterloo (2007)
6.
Zurück zum Zitat Asonov, D.: Private Information retrieval: an overview and current trends. In the ECDPvA Workshop, Informatik (2001) Asonov, D.: Private Information retrieval: an overview and current trends. In the ECDPvA Workshop, Informatik (2001)
7.
Zurück zum Zitat Sassaman, L., Cohen, B., Mathewson, N.: The pynchon gate: a secure method of pseudonymous mail retrieval. In: WPES (2005) Sassaman, L., Cohen, B., Mathewson, N.: The pynchon gate: a secure method of pseudonymous mail retrieval. In: WPES (2005)
8.
Zurück zum Zitat Miceli, A.M., Sample, B.J., Ioup, C.E., Abdelguerfi, D.M.: Private information retrieval in an anonymous peer-to-peer environment. In: SAM (2011) Miceli, A.M., Sample, B.J., Ioup, C.E., Abdelguerfi, D.M.: Private information retrieval in an anonymous peer-to-peer environment. In: SAM (2011)
9.
Zurück zum Zitat Clarke, I., Sandberg, O., Wiley, B., Hong, T. W.: Freenet: a distributed anonymous information storage and retrieval system. In: Designing privacy enhancing technologies (2001) Clarke, I., Sandberg, O., Wiley, B., Hong, T. W.: Freenet: a distributed anonymous information storage and retrieval system. In: Designing privacy enhancing technologies (2001)
10.
Zurück zum Zitat Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. Technical Report, DTIC Document (2004) Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. Technical Report, DTIC Document (2004)
11.
Zurück zum Zitat Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: A fast (\(k\), \(L\), \(n\))-threshold ramp secret sharing scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92, 1808–1821 (2009)CrossRef Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: A fast (\(k\), \(L\), \(n\))-threshold ramp secret sharing scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92, 1808–1821 (2009)CrossRef
12.
Zurück zum Zitat Yamamoto, H.: Secret sharing system using (\(k\), \(L\), \(n\)) threshold scheme. Electronics and Communications in Japan (Part I: Communications) (1986) Yamamoto, H.: Secret sharing system using (\(k\), \(L\), \(n\)) threshold scheme. Electronics and Communications in Japan (Part I: Communications) (1986)
13.
Zurück zum Zitat Shamir, A.: How to share a secret. ACM Commun. 22(11), 612–613 (1979) Shamir, A.: How to share a secret. ACM Commun. 22(11), 612–613 (1979)
14.
Zurück zum Zitat Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of the national computer conference, vol. 48 (1979) Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of the national computer conference, vol. 48 (1979)
15.
Zurück zum Zitat Blakley, G.R., Meadows, C.A.: Security of ramp schemes. In: CRYPTO (1984) Blakley, G.R., Meadows, C.A.: Security of ramp schemes. In: CRYPTO (1984)
16.
Zurück zum Zitat Franklin, M.K., Yung, M.: Communication complexity of secure computation. In: STOC (1992) Franklin, M.K., Yung, M.: Communication complexity of secure computation. In: STOC (1992)
17.
Zurück zum Zitat Beimel, A., Ishai, Y., Kushilevitz, E.: General constructions for information-theoretic private information retrieval. J. Comput. Syst. Sci. 71(2), 213–247 (2005) Beimel, A., Ishai, Y., Kushilevitz, E.: General constructions for information-theoretic private information retrieval. J. Comput. Syst. Sci. 71(2), 213–247 (2005)
18.
Zurück zum Zitat Beimel, A., Ishai, Y., Kushilevitz, E., Orlov, I.: Share conversion and private information retrieval. In: CCC (2012) Beimel, A., Ishai, Y., Kushilevitz, E., Orlov, I.: Share conversion and private information retrieval. In: CCC (2012)
19.
Zurück zum Zitat Henry, R., Huang, Y., Goldberg, I.: One (block) size fits all: PIR and SPIR over arbitrary-length records via multi-block PIR queries. In: NDSS ’13 Henry, R., Huang, Y., Goldberg, I.: One (block) size fits all: PIR and SPIR over arbitrary-length records via multi-block PIR queries. In: NDSS ’13
20.
Zurück zum Zitat Goldberg, I.: Improving the robustness of private information retrieval. In: IEEE S&P (2007) Goldberg, I.: Improving the robustness of private information retrieval. In: IEEE S&P (2007)
21.
Zurück zum Zitat Devet, C., Goldberg, I., Heninger, N.: Optimally robust private information retrieval. In: USENIX Security (2012) Devet, C., Goldberg, I., Heninger, N.: Optimally robust private information retrieval. In: USENIX Security (2012)
22.
Zurück zum Zitat Yekhanin, S.: Towards 3-query locally decodable codes of subexponential length. In: STOC (2007) Yekhanin, S.: Towards 3-query locally decodable codes of subexponential length. In: STOC (2007)
23.
Zurück zum Zitat Efremenko, K.: 3-Query locally decodable codes of subexponential length. In: STOC (2009) Efremenko, K.: 3-Query locally decodable codes of subexponential length. In: STOC (2009)
24.
Zurück zum Zitat Itoh, T., Suzuki, Y.: Improved constructions for query-efficient locally decodable codes of subexponential length. IEICE Trans. Inf. Syst. 93(2), 159–189 (2010) Itoh, T., Suzuki, Y.: Improved constructions for query-efficient locally decodable codes of subexponential length. IEICE Trans. Inf. Syst. 93(2), 159–189 (2010)
25.
Zurück zum Zitat Chee, Y.M., Tao, F., Ling, S., Wang, H., Zhang, L.F.: Query-efficient locally decodable codes of subexponential length. In: IEEE CCC (2011) Chee, Y.M., Tao, F., Ling, S., Wang, H., Zhang, L.F.: Query-efficient locally decodable codes of subexponential length. In: IEEE CCC (2011)
26.
Zurück zum Zitat Barkol, O., Ishai, Y., Weinreb, E.: On locally decodable codes, self-correctable codes, and \(t\)-private PIR. In: APPROX (2007) Barkol, O., Ishai, Y., Weinreb, E.: On locally decodable codes, self-correctable codes, and \(t\)-private PIR. In: APPROX (2007)
27.
Zurück zum Zitat Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A.: Batch codes and their applications. In: STOC (2004) Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A.: Batch codes and their applications. In: STOC (2004)
28.
Zurück zum Zitat Wang, S., Agrawal, D., El Abbadi, A.: Generalizing PIR for practical private retrieval of public data. In: DBSec (2010) Wang, S., Agrawal, D., El Abbadi, A.: Generalizing PIR for practical private retrieval of public data. In: DBSec (2010)
29.
Zurück zum Zitat Olumofin, F., Goldberg, I.: Revisiting the computational practicality of private information retrieval. In: FC (2011) Olumofin, F., Goldberg, I.: Revisiting the computational practicality of private information retrieval. In: FC (2011)
33.
Zurück zum Zitat Wu, D., Tang, C., Dhungel, P., Saxena, N., Ross, K.W.: On the privacy of peer-assisted distribution of security patches. In: P2P (2010) Wu, D., Tang, C., Dhungel, P., Saxena, N., Ross, K.W.: On the privacy of peer-assisted distribution of security patches. In: P2P (2010)
Metadaten
Titel
rPIR: ramp secret sharing-based communication-efficient private information retrieval
verfasst von
Lichun Li
Michael Militzer
Anwitaman Datta
Publikationsdatum
02.09.2016
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Information Security / Ausgabe 6/2017
Print ISSN: 1615-5262
Elektronische ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-016-0347-8

Weitere Artikel der Ausgabe 6/2017

International Journal of Information Security 6/2017 Zur Ausgabe