A fault-tolerant approach to secure information retrieval

被引:3
|
作者
Yang, EY [1 ]
Jie, X [1 ]
Bennett, KH [1 ]
机构
[1] Univ Durham, Dept Comp Sci, Durham DH1 3LE, England
关键词
Distributed database systems; fault tolerance; malicious faults; private information retrieval; secret sharing; security;
D O I
10.1109/RELDIS.2002.1180169
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several Private Information Retrieval (PIR) schemes were proposed to protect users' privacy when sensitive information stored in database servers is retrieved. However, existing PIR schemes assume that any attack to the servers does not change the information stored and any computational results. We present a novel fault-tolerant PIR scheme (called FT-PIR) that protects users' privacy and at the same time ensures service availability in the presence of malicious server faults. Our scheme neither relies on any unproven cryptographic assumptions nor the availability of tamper-proof hardware. A probabilistic verification function is introduced into the scheme to detect corrupted results. Unlike previous PIR research that attempted mainly to demonstrate the theoretical feasibility of PIR, we have actually implemented both a PIR scheme and our FT-PIR scheme in a distributed database environment. The experimental and analytical results show that only, modest performance overhead is introduced by FT-PIR while comparing with PIR in the fault free cases. The FT-PIR scheme tolerates a variety, of server faults effectively. In certain fail-stop fault scenarios, FT-PIR performs even better than PIR. It was observed that 35.82% less processing time was actually needed for FT-PIR to tolerate one server fault.
引用
收藏
页码:12 / 21
页数:10
相关论文
共 50 条
  • [1] Fault-tolerant symmetrically-private information retrieval
    Wang, Tian-Yin
    Cai, Xiao-Qiu
    Zhang, Rui-Ling
    INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 2016, 30 (25):
  • [2] Towards fault-tolerant and secure agentry
    Schneider, FB
    DISTRIBUTED ALGORITHMS, PROCEEDINGS, 1997, 1320 : 1 - 14
  • [3] A RAID-BASED SECURE AND FAULT-TOLERANT MODEL FOR CLOUD INFORMATION STORAGE
    Fitch, Daniel
    Xu, Haiping
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2013, 23 (05) : 627 - 654
  • [4] Secure fault-tolerant code for cloud storage
    Tan, Peng-Xu
    Chen, Yue
    Lan, Ju-Long
    Jia, Hong-Yong
    Tongxin Xuebao/Journal on Communications, 2014, 35 (03): : 109 - 115
  • [5] Secure and fault-tolerant voting in distributed systems
    Hardekopf, B
    Kwiat, K
    Upadhyaya, S
    2001 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOLS 1-7, 2001, : 1117 - 1126
  • [6] FAULT-TOLERANT BROADCAST OF ROUTING INFORMATION
    PERLMAN, R
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1983, 7 (06): : 395 - 405
  • [7] A Fault Recovery Approach in Fault-Tolerant Processor
    Li, Hongbing
    Shang, Lihong
    Dang, Jianxun
    Jin, Huihua
    2009 INTERNATIONAL CONFERENCE ON SCALABLE COMPUTING AND COMMUNICATIONS & EIGHTH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING, 2009, : 52 - 57
  • [8] Modeling of Security Fault-Tolerant Requirements for Secure Systems
    Pathirage, Don
    Shin, Michael
    Jang, Dongsoo
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2023, 33 (01) : 23 - 53
  • [9] A Secure and Fault-Tolerant Architecture for LoRaWAN Based on Blockchain
    Ribeiro, Victor
    Filho, Raimir Holanda
    Ramos, Alex
    2019 3RD CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2019,
  • [10] Using composition to design secure, fault-tolerant systems
    Olawsky, D
    Payne, C
    Sundquist, T
    Apostal, D
    Fine, T
    THIRD IEEE INTERNATIONAL HIGH-ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 1998, : 29 - 32