Extended results on privacy against coalitions of users in user-private information retrieval protocols

被引:0
|
作者
Colleen M. Swanson
Douglas R. Stinson
机构
[1] University of Michigan,Computer Science and Engineering
[2] University of Waterloo,David R. Cheriton School of Computer Science
来源
关键词
User-private information retrieval; Query obfuscation; Anonymity; Combinatorial designs; 05B05; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
In peer-to-peer user-private information retrieval, or P2P UPIR, the goal is to provide increased privacy for users querying a database. This is accomplished by leveraging a P2P network in which users forward each other’s queries to the database. That is, the database is trusted to serve correct answers to user queries, but not trusted to know the identity of the user who sent particular queries (or the source of the queries): users wish to maintain anonymity (relative to other users) with respect to the database. In this paper, we analyze protocols by Swanson and Stinson that are based on combinatorial designs; the use of combinatorial designs for P2P UPIR is a natural approach, because the “balance” properties of designs translate into desirable (and sometimes optimal) security properties in the resulting protocols. Our main contribution is to extend previous work by analyzing the privacy properties of suggested P2P UPIR protocols with respect to coalitions of honest-but-curious users. Previous work focuses on privacy properties achieved with respect to the database; as such, our work fills an important gap in the analysis of these protocols. We provide an analysis of the probabilistic advantage user coalitions have in guessing the source of a query. In particular, when a set of queries is linked by subject matter (i.e., the content of the queries reveals the fact that they have a common source), it is difficult to protect against user coalitions. We provide new results with respect to user attacks on linked queries, and we analyze the use of query hops as a mitigation technique, in which queries are probabilistically written to one or more memory spaces before forwarding to the database.
引用
收藏
页码:415 / 437
页数:22
相关论文
共 50 条
  • [1] Extended results on privacy against coalitions of users in user-private information retrieval protocols
    Swanson, Colleen M.
    Stinson, Douglas R.
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2015, 7 (04): : 415 - 437
  • [2] EXTENDED COMBINATORIAL CONSTRUCTIONS FOR PEER-TO-PEER USER-PRIVATE INFORMATION RETRIEVAL
    Swanson, Colleen M.
    Stinson, Douglas R.
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2012, 6 (04) : 479 - 497
  • [3] Improved user-private information retrieval via finite geometry
    Oliver W. Gnilke
    Marcus Greferath
    Camilla Hollanti
    Guillermo Nuñez Ponasso
    Padraig Ó Catháin
    Eric Swartz
    [J]. Designs, Codes and Cryptography, 2019, 87 : 665 - 677
  • [4] Improved user-private information retrieval via finite geometry
    Gnilke, Oliver W.
    Greferath, Marcus
    Hollanti, Camilla
    Ponasso, Guillermo Nunez
    Cathain, Padraig O.
    Swartz, Eric
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (2-3) : 665 - 677
  • [5] User-private information retrieval based on a peer-to-peer community
    Domingo-Ferrer, Josep
    Bras-Amoros, Maria
    Wu, Qianhong
    Manjon, Jesus
    [J]. DATA & KNOWLEDGE ENGINEERING, 2009, 68 (11) : 1237 - 1252
  • [6] Optimal configurations for peer-to-peer user-private information retrieval
    Stokes, Klara
    Bras-Amoros, Maria
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 59 (04) : 1568 - 1577
  • [7] Another Look at Extended Private Information Retrieval Protocols
    Bringer, Julien
    Chabanne, Herve
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 305 - 322
  • [8] An Efficient User Privacy Preserving Multi-server Private Information Retrieval (An Efficient Privacy Preserving Information Storage and Retrieval Framework)
    Bhat, Radhakrishna
    Sunitha, N. R.
    [J]. ICDCN '19: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2019, : 509 - 509
  • [9] A NOVEL PRIVATE INFORMATION RETRIEVAL SCHEME WITH FAIR PRIVACY IN THE USER SIDE AND THE SERVER SIDE
    Chen, Chun-Hua
    Horng, Gwoboa
    Hsu, Chao-Hsing
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (03): : 801 - 810
  • [10] Degeneracy bounds for private information retrieval protocols
    Maylybaeva, G. A.
    [J]. DISCRETE MATHEMATICS AND APPLICATIONS, 2006, 16 (03): : 245 - 257