Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates

نویسنده

  • Justin Cappos
چکیده

This work demonstrates the feasibility of building a PIR system with performance similar to non-PIR systems in real situations. Prior Chor PIR systems have chosen block sizes that are theoretically optimized to minimize communication. This (ironically) reduces the throughput of the resulting system by roughly 50x. We constructed a Chor PIR system called upPIR that is efficient by choosing block sizes that are theoretically suboptimal (from a communications standpoint), but fast and efficient in practice. For example, an upPIR mirror running on a threeyear-old desktop provides security updates from Ubuntu 10.04 (1.4 GB of data) fast enough to saturate a T3 link. Measurements run using mirrors distributed around the Internet demonstrate that a client can download software updates with upPIR about as quickly as with FTP.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Pricing Strategy and Innovation Incentives for Security Software: Theory and Evidence

We develop an analytical model that presents optimal pricing strategies for a multi-product software firm selling consumer security software. Our model highlights two aspects unique to this kind of software. The first is a supply-side effect that alters its cost structure due to the nonnegligible costs of providing security updates and patches to minimize vulnerabilities and prevent security br...

متن کامل

On the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets (Extended Version)

In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private set intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties can compute the intersection between their sets without disclosing any information about compone...

متن کامل

Pricing Security Software: Theory and Evidence

This paper presents a model of multi-product pricing for consumer security software. It highlights two aspects unique to this kind of software. The …rst is a supply-side e¤ect relating to the security software update process that alters its cost structure, and the second is a demand-side e¤ect relating to the fact that customers often get free substitutes for components of security software sui...

متن کامل

A Competent two tier Secure Key Management Scheme for Hierarchical Wireless Sensor Networks

Key management in wireless sensor network is a complex task due to its nature of environment. Wireless sensor network comprise of large number of sensor nodes with different hardware abilities and functions. Due to the limited memory resources and energy constraints, complex security algorithms cannot be used in sensor networks. Therefore, an energy efficient key management scheme is necessary ...

متن کامل

An Improved Key Management Scheme for Hierarchical Wireless Sensors Networks

Key management play a central role for protecting communication in WSNs. Due to the limited memory resources and energy constraints, complex security algorithms cannot be used in sensor networks. Therefore, to secure data communication and well balance between the security level and the associated energy consumption is a challenging task. In this paper, we present an Improved Key management Sch...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013