Private Information Retrieval in the Presence of Malicious Failures
نویسندگان
چکیده
In the application domain of online information services such as online census information, health records and real-time stock quotes, there are at least two fundamental challenges: the protection of users’ privacy and the assurance of service availability. We present a fault-tolerant scheme for private information retrieval (FT-PIR) that protects users’ privacy and ensures service provision in the presence of malicious server failures. An error detection algorithm is introduced into this scheme to detect the corrupted results from servers. The analytical and experimental results show that the FT-PIR scheme can tolerate malicious server failures effectively and prevent any information of users from being leaked to attackers. This new scheme does not rely on any unproven cryptographic premise and the availability of tamperproof hardware. An implementation of the FT-PIR scheme on a distributed database system suggests just a modest level of performance overhead.
منابع مشابه
Software Services and Software Maintenance
Software services are being promoted as the next big step forward in software engineering.. Inevitably, both service vendor and service client programs will require maintenance. We present a service architecture that has been motivated by a long term vision for software as something which is used, not owned. This architecture is used to show how evolution of software can be achieved. It uses th...
متن کاملOptimally Robust Private Information Retrieval
We give a protocol for multi-server information-theoretic private information retrieval which achieves the theoretical limit for Byzantine robustness. That is, the protocol can allow a client to successfully complete queries and identify server misbehavior in the presence of the maximum possible number of malicious servers. We have implemented our scheme and it is extremely fast in practice: up...
متن کاملSharing with Limited Trust: An Attack Tolerance Service in Durham e-Demand Project
The unique characteristics of the Grid pose significant new security challenges that demand for new solutions. This paper argues that only limited trust should be placed in the grid environment. The trust relationship among grid nodes may be valid only within the lifetime of a submitted job. We focus on two key security challenges centred on the trust issue: protecting the intention (privacy) o...
متن کاملOn the Possibility of Basing Oblivious Transfer on Weakened Private Information Retrieval
We consider the problem of reducing Oblivious Transfer to Private Information Retrieval. We give a simple reduction from 1-out-of-2 Oblivious Transfer to Private Information Retrieval, where the reduction is against malicious players. We also consider the completeness of Private Information Retrieval on weakened assumption. We will give a impossibility result and a possibility result. For impos...
متن کاملA Fault-Tolerant Approach to Secure Information Retrieval
For any critical information services, there are two fundamental challenges: the protection of users’ privacy and the provision of highly available services. Several schemes for private information retrieval (PIR) were proposed to protect users’ privacy when sensitive information stored in (remote) database servers is accessed. However, all the existing PIR schemes are based on a simple honest-...
متن کامل