The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - January/February (2012 vol.9)
pp: 115-127
Spiridon Bakiras , John Jay College, City University of New York, New York
Dimitris Papadias , The Hong Kong University of Science and Technology, Hong Kong
ABSTRACT
Computational Private Information Retrieval (cPIR) protocols allow a client to retrieve one bit from a database, without the server inferring any information about the queried bit. These protocols are too costly in practice because they invoke complex arithmetic operations for every bit of the database. In this paper, we present pCloud, a distributed system that constitutes the first attempt toward practical cPIR. Our approach assumes a disk-based architecture that retrieves one page with a single query. Using a striping technique, we distribute the database to a number of cooperative peers, and leverage their computational resources to process cPIR queries in parallel. We implemented pCloud on the PlanetLab network, and experimented extensively with several system parameters. Our results indicate that pCloud reduces considerably the query response time compared to the traditional client/server model, and has a very low communication overhead. Additionally, it scales well with an increasing number of peers, achieving a linear speedup.
INDEX TERMS
Privacy, private information retrieval, databases, distributed systems, implementation.
CITATION
Spiridon Bakiras, Dimitris Papadias, "pCloud: A Distributed System for Practical PIR", IEEE Transactions on Dependable and Secure Computing, vol.9, no. 1, pp. 115-127, January/February 2012, doi:10.1109/TDSC.2010.60
REFERENCES
[1] LiDIA—A C++ Library for Computational Number Theory. http://www.cdc.informatik.tu- darmstadt.de/ TILiDIA/, 2009.
[2] Limewire, http:/www.limewire.com/, 2009.
[3] PlanetLab, http:/www.planet-lab.org/, 2009.
[4] The GNU MP Bignum Library, http:/gmplib.org/, 2009.
[5] Tor: Anonymity Online, http:/www.torproject.org/, 2009.
[6] A. Ambainis, "Upper Bound on Communication Complexity of Private Information Retrieval," Proc. Int'l Colloquium on Automata, Languages, and Programming (ICALP '97), 1997.
[7] A. Beimel, Y. Ishai, E. Kushilevitz, and J.-F. Raymond, "Breaking the ${O}(n^{1 \over {2k-1}})$ Barrier for Information-Theoretic Private Information Retrieval," Proc. Symp. Foundations of Computer Science (FOCS '02), 2002.
[8] C. Cachin, S. Micali, and M. Stadler, "Computationally Private Information Retrieval with Polylogarithmic Communication," Proc. Int'l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT '99), 1999.
[9] B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, "Private Information Retrieval," Proc. Symp. Foundations of Computer Science (FOCS '95), 1995.
[10] D. Coppersmith, "Finding a Small Root of a Univariate Modular Exponentiation," Proc. Int'l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT '96), 1996.
[11] R. Dingledine, N. Mathewson, and P.F. Syverson, "Tor: The Second-Generation Onion Router," Proc. Conf. USENIX Security Symp. (SSYM '04), 2004.
[12] W. Gasarch, "A Survey on Private Information Retrieval (Column: Computational Complexity)," Bull. of the European Assoc. for Theoretical Computer Science (EATCS), vol. 82, pp. 72-107, 2004.
[13] W. Gasarch and A. Yerukhimovich, "Computationally Inexpensive cPIR," Unpublished Draft, 2006.
[14] C. Gentry and Z. Ramzan, "Single-Database Private Information Retrieval with Constant Communication Rate," Proc. Int'l Colloquium on Automata, Languages, and Programming (ICALP '05), 2005.
[15] G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan, "Private Queries in Location Based Services: Anonymizers Are Not Necessary," Proc. ACM SIGMOD '08, 2008.
[16] A. Iliev and S.W. Smith, "Private Information Storage with Logarithm-Space Secure Hardware," Proc. Workshop Information Security, Management, Education, and Privacy, 2004.
[17] A. Khoshgozaran, H. Shirani-Mehr, and C. Shahabi, "SPIRAL: A Scalable Private Information Retrieval Approach to Location Privacy," Proc. Workshop Privacy-Aware Location-Based Mobile Services (PALMS '08), 2008.
[18] E. Kushilevitz and R. Ostrovsky, "Replication Is Not Needed: Single Database, Computationally-Private Information Retrieval," Proc. Symp. Foundations of Computer Science (FOCS '07), 1997.
[19] H. Lipmaa, "An Oblivious Transfer Protocol with Log-Squared Communication," Proc. Information Security Conf. (ISC '05), 2005.
[20] C.A. Melchor and P. Gaborit, "A Fast Private Information Retrieval Protocol," Proc. IEEE Int'l Symp. Information Theory (ISIT '08), 2008.
[21] A.J. Menezes, P.C. Van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography. CRC Press, 1997.
[22] R. Ostrovsky and W.E. Skeith III, "A Survey of Single-Database Private Information Retrieval: Techniques and Applications," Proc. Int'l Conf. Practice and Theory in Public-Key Cryptography (PKC '07), 2007.
[23] D.A. Patterson, G.A. Gibson, and R.H. Katz, "A Case for Redundant Arrays of Inexpensive Disks (RAID)," Proc. ACM SIGMOD '88, 1988.
[24] L. Sassaman, B. Cohen, and N. Mathewson, "The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval," Proc. Workshop Privacy in the Electronic Soc. (WPES '05), 2005.
[25] R. Sion and B. Carbunar, "On the Computational Practicality of Private Information Retrieval," Proc. Symp. Network and Distributed System Security (NDSS '07), 2007.
[26] I. Stoica, R. Morris, D.R. Karger, M.F. Kaashoek, and H. Balakrishnan, "Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications," Proc. ACM SIGCOMM '01, 2001.
[27] S. Wang, X. Ding, R.H. Deng, and F. Bao, "Private Information Retrieval Using Trusted Hardware," Proc. European Symp. Research in Computer Security (ESORICS '06), 2006.
[28] P. Williams and R. Sion, "Usable PIR," Proc. Symp. Network and Distributed System Security (NDSS '08), 2008.
[29] S. Yekhanin, "Towards 3-Query Locally Decodable Codes of Subexponential Length," J. ACM, vol. 55, no. 1, pp. 1-16, 2008.
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool