Efficient Private Information Retrieval Over Unsynchronized Databases

被引:25
作者
Fanti, Giulia [1 ]
Ramchandran, Kannan [1 ]
机构
[1] Univ Calif Berkeley, Dept Elect Engn & Comp Sci, Berkeley, CA 94704 USA
基金
美国国家科学基金会;
关键词
Database management; information flow controls; privacy;
D O I
10.1109/JSTSP.2015.2432740
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Web search histories can reveal detailed and sensitive information about people. Private information retrieval (PIR) tackles this potential privacy violation by allowing users to retrieve the wth record of a database without revealing to the server. However, most known PIR schemes are either very inefficient (and therefore unlikely to gain traction in a practical sense) or reliant on some restrictive assumptions. In this paper, we consider an efficient class of schemes called multi-server PIR. Multi-server PIR assumes that the client communicates with multiple, non-colluding servers, each possessing an identical copy of the database. Significant prior work has gone towards relaxing the anti-collusion assumption, but the literature does not address the assumption that servers store perfectly-synchronized databases. This seems implausible, especially if servers are not meant to collude. We propose the first multi-server PIR scheme to return the desired record even when servers' databases are not perfectly synchronized. Our scheme asymptotically has the same computational and communication complexity as state-of-the-art PIR schemes for synchronized databases; this comes at the expense of probabilistic success and two rounds of communication (most existing schemes require only one). Additionally, this approach efficiently processes multiple concurrent PIR queries.
引用
收藏
页码:1229 / 1239
页数:11
相关论文
共 36 条
[1]  
[Anonymous], 1977, Proceedings of the Ninth Annual ACM Symposium on Theory of Computing, STOC'77, page, DOI [10.1145/800105.803400, DOI 10.1145/800105.803400]
[2]  
[Anonymous], 2009, Lessons from the Identity trail: Anonymity, privacy, and identity in a networked society
[3]  
Barbaro MichaelTom Zeller Jr., 2006, A Face Is Exposed for AOL Searcher No. 4417749
[4]   General constructions for information-theoretic private information retrieval [J].
Beimel, A ;
Ishai, Y ;
Kushievitz, E .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2005, 71 (02) :213-247
[5]  
Beimel A, 2003, LECT NOTES COMPUT SC, V2576, P326
[6]  
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[7]   New constructions and practical applications for private stream searching - (Extended abstract) [J].
Bethencourt, John ;
Song, Dawn ;
Waters, Brent .
2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, :132-+
[8]  
Chor B, 1995, AN S FDN CO, P41, DOI 10.1109/SFCS.1995.492461
[9]  
de Finetti B., 1972, Probability, induction and statistics
[10]  
the art of guessing