Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

Private information retrieval

Published: 01 November 1998 Publication History
  • Get Citation Alerts
  • Abstract

    Publicly accessible databases are an indispensable resource for retrieving up-to-date information. But they also pose a significant risk to the privacy of the user, since a curious database operator can follow the user's queries and infer what the user is after. Indeed, in cases where the users' intentions are to be kept secret, users are often cautious about accessing the database. It can be shown that when accessing a single database, to completely guarantee the privacy of the user, the whole database should be down-loaded; namely n bits should be communicated (where n is the number of bits in the database).
    In this work, we investigate whether by replicating the database, more efficient solutions to the private retrieval problem can be obtained. We describe schemes that enable a user to access k replicated copies of a database (k≥2) and privately retrieve information stored in the database. This means that each individual server (holding a replicated copy of the database) gets no information on the identity of the item retrieved by the user. Our schemes use the replication to gain substantial saving. In particular, we present a two-server scheme with communication complexity O(n1/3).

    References

    [1]
    ABADI, M., FEIGENBAUM, J., AND KILIAN, J. 1989. On hiding information from an oracle. J. Cornput. Syst. Sci. 39, 1, 21-50.
    [2]
    ADAM, N., AND WORTMANN, J. 1989. Security-control methods for statistical databases: A comparative study. ACM Comput. Surv. 21, 4 (Dec.), 515-556.
    [3]
    AMBAINIS, A. 1997. An upper bound on the communication complexity of private information retrieval. In Proceedings of the 24th ICALP. Lecture Notes in Computer Science, vol. 1256. Springer-Verlag, New York, pp. 401-407.
    [4]
    BABAI, L., KIMMEL, P., AND LOKAM, S. V. 1995. Simultaneous messages vs. communication. In Proceedings of the Symposium on Theoretical Aspects in Computer Science (STACS). Lecture Notes in Computer Science. Springer-Verlag, New York, pp. 361-372.
    [5]
    BEAVER, D., AND FEIGENBAUM, J. 1990. Hiding instances in multioracle queries. In Proceedings of the STACS. Lecture Notes in Computer Science, vol. 415. Springer-Verlag, New York, pp. 37-48.
    [6]
    BEAVER, D., FEIGENBAUM, J., KILIAN, J., AND ROGAWAY, P. 1991. Security with low communication overhead. In Proceedings of CRYPTO'90. Lecture Notes in Computer Sciences, vol. 537. Springer-Verlag, New York, pp. 62-76.
    [7]
    BEAVER, D., FEIGENBAUM, J., KILIAN, J., AND ROGAWAY, P. 1997. Locally random reductions: Improvements and applications. J. Crypt. 10, 1, 17-36.
    [8]
    CERI, S., AND PELIGATTI, G. 1984. Distributed database principles & systems. McGraw-Hill, New York.
    [9]
    CHIN, f. 1986. Security problems on inference control for SUM, MAX, and MIN queries. J. ACM 33, 3 (July), 451-464.
    [10]
    CHOR, B., AND GILBOA, N. 1997. Computationally private information retrieval. In Proceedings of the 29th Annual Symposium on the Theory of Computing (El Paso, Tex., May 4-6). ACM, New York, pp. 304-313.
    [11]
    CHOR, B., GILBOA, N., AND NAOR, M. 1997. Private information retrieval by keywords. Tech. Rep. TR CS0917. Dept. Comput. Science. Technion, Israel.
    [12]
    CHOR, B., GOLDREICH, O., KUSHILEVITZ, E., AND SUDAN, M. 1995. Private information retrieval. In Proceedings of the 36th Annual Foundations of Computer Science. IEEE Computer Society Press, Los Alamitos, Calif., pp. 41-50.
    [13]
    DENNING, D. 1982. Crytography and Data Security. Addison-Wesley, Reading, Mass.
    [14]
    DOBKIN, D., JONES, A. K., AND LIPTON, R. J. 1979. Secure databases: Protection against user influence. ACM Trans. Datab. Syst. 4, 1 (Mar.), 97-106.
    [15]
    FORTNOW, L., AND SZEGEDY, M. 1992. On the power of two-local random reductions. Inf. Proc. Lett. 44, 6, 303-306.
    [16]
    GALLAGER, R.G. 1968. Information Theory and Reliable Communication. Wiley, New York.
    [17]
    GERTNER, f., ISHAI, f., KUSHILEVITZ, E., AND MALKIN, f. 1998. Protecting data privacy in private information retrieval schemes. In Proceedings of the 30th Annual ACM Symposium on Theory of Computing (Dallas, Tex., May 23-26). ACM, New York, pp. 151-160.
    [18]
    GOLDREICH, O., AND OSTROVSKY, R. 1996. Software protection and simulation on oblivious RAMs. J. ACM 43, 3 (May), 431-473.
    [19]
    HONKALA, I.S. 1991. Modified bounds for covering codes. IEEE Trans. Inf. Theory 37, 2, 351-365.
    [20]
    KUSHILEVITZ, E., AND OSTROVSKY, R. 1997. Replication is not needed: Single database, computationally-private information retrieval. In Proceedings of the 38th Symposium on Foundations of Computer Science. IEEE Computer Society Press, Los Alamitos, Calif., pp. 364-373.
    [21]
    OSTROVSKY, R., AND SHOUP, V. 1997. Private information storage. In Proceedings of the 29th Annual ACM Symposium on Theory of Computing (El Paso, Tex., May 4-6). ACM, New York, pp. 294-303.
    [22]
    PUDLAK, P., AND RODL, V. 1993. Modified ranks of tensors and the size of circuits. In Proceedings of the 25th Annual ACM Symposium on Theory of Computing (San Diego, Calif., May 16-18). ACM, New York, pp. 523-531.
    [23]
    PUDLAK, P., RC)DL, V., AND SGALL, J. 1997. Boolean, circuits, tensor ranks, and communication complexity. SICOMP 26, 605-633.
    [24]
    RWEST, R.L.1989. Private communication, quoted in the Acknowledgment section of ABADI, E AL. {1989}.
    [25]
    RIVEST, R. L., ADLEMAN, L., AND DERTOUZOS, M.L. 1978. On data banks and privacy homomorphisms. In Foundations of Secure Computation, R. DeMillo, D. Dobkin, A. Jones, and R. Lipton, eds. Academic Press, Orlando, Fla.
    [26]
    TENDICK, P., AND MATLOFF, N. 1994. A modified random perturbation method for database security. ACM Trans. Datab. Syst. 19, 1 (Mar.), 47-63.
    [27]
    ULLMAN, J.D. 1982. Principles of Database Systems, 2nd ed. Computer Science Press, Potomac, Md.

    Cited By

    View all
    • (2024)A Ciphertext Reduction Scheme for Garbling an S-Box in an AES Circuit with Minimal Online TimeSymmetry10.3390/sym1606066416:6(664)Online publication date: 28-May-2024
    • (2024)Metadata-Private Resource Allocation in Edge Computing Withstands Semi-Malicious Edge NodesSensors10.3390/s2410298924:10(2989)Online publication date: 8-May-2024
    • (2024)A Secure Face Verification Scheme Based on Fully Homomorphic Encryption with AnonymityInformation10.3390/info1503012915:3(129)Online publication date: 24-Feb-2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Journal of the ACM
    Journal of the ACM  Volume 45, Issue 6
    Nov. 1998
    185 pages
    ISSN:0004-5411
    EISSN:1557-735X
    DOI:10.1145/293347
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 November 1998
    Published in JACM Volume 45, Issue 6

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1,256
    • Downloads (Last 6 weeks)140

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Ciphertext Reduction Scheme for Garbling an S-Box in an AES Circuit with Minimal Online TimeSymmetry10.3390/sym1606066416:6(664)Online publication date: 28-May-2024
    • (2024)Metadata-Private Resource Allocation in Edge Computing Withstands Semi-Malicious Edge NodesSensors10.3390/s2410298924:10(2989)Online publication date: 8-May-2024
    • (2024)A Secure Face Verification Scheme Based on Fully Homomorphic Encryption with AnonymityInformation10.3390/info1503012915:3(129)Online publication date: 24-Feb-2024
    • (2024)Deceptive Information RetrievalEntropy10.3390/e2603024426:3(244)Online publication date: 10-Mar-2024
    • (2024)Correlated Randomness Reduction in Domain-Restricted Secure Two-Party ComputationIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences10.1587/transfun.2023CIP0023E107.A:3(283-290)Online publication date: 1-Mar-2024
    • (2024)Research progress of verifiable technologies for outsourcing servicesSCIENTIA SINICA Informationis10.1360/SSI-2022-036054:3(514)Online publication date: 6-Mar-2024
    • (2024)Constant Query Local Decoding against Deletions Is ImpossibleProceedings of the 56th Annual ACM Symposium on Theory of Computing10.1145/3618260.3649655(752-763)Online publication date: 10-Jun-2024
    • (2024)Mental Models, Expectations and Implications of Client-Side Scanning: An Interview Study with ExpertsProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642310(1-24)Online publication date: 11-May-2024
    • (2024)The Capacity of 3 User Linear Computation BroadcastIEEE Transactions on Information Theory10.1109/TIT.2024.339268570:6(4414-4438)Online publication date: Jun-2024
    • (2024) The Asymptotic Capacity of X -Secure T -Private Linear Computation With Graph Based Replicated Storage IEEE Transactions on Information Theory10.1109/TIT.2024.338859770:7(5269-5288)Online publication date: Jul-2024
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media