Private Information Storage

نویسندگان

  • Rafail Ostrovsky
  • Victor Shoup
چکیده

We consider the setting of hiding information through the use of multiple databases that do not interact with one another. In this setting, there are k 2 \databases" which can be accessed by some \users". Users do not keep any state information, but wish to access O(n) bits of \data". Previously, in this setting solutions for retrieval of data in the eecient manner were given, where a user achieves this by interacting with all the databases. We consider the case of both writing and reading. While the case of reading was well studied before, the case of writing was previously completely open. In this paper, we show how to implement both read and write operations, with the following strong security guarantees: all the information about the read/write operation is information-theoretically hidden from all the databases (i.e. both the value of the bit and the address of the bit). As in the previous papers, we measure, as a function of k and n the amount of communication required between a user and all the databases for a single read/write operation, and achieve eecient read/write schemes. Moreover, we show a general reduction from reading database scheme to reading and writing database scheme, with the following guarantees: for any k, given a retrieval only k-database scheme with communication complexity R(k; n) we show a (k + 1) reading and writing database scheme with total communication complexity O R(k; n) (log n) O(1). Our general reduction in combination with the paper of Chor,Goldreich,Kushilevtiz,Sudan] yields: a 3-database scheme with read/write communication complexity of O n 1=3 (log n) 3 ; for all constants k 2, a (k + 1)-database scheme with read/write communication complexity of O n 1=k (log n) 3 ; O(log n)-database scheme with read/write communication complexity of O ? (log n) 3. It should be stressed that prior to the current paper no trivial (i.e. sub-linear) bounds for private information storage were known. Moreover, our result yields a solution to the problem of information-theoretically secure Oblivious RAM simulation with poly-log overhead in the above setting. Our result also implies that eecient instance-hiding schemes where the state can be altered are possible.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Little Storage Goes a Long Way: Accelerating Private Information Retrieval

The authors have previously shown that existing single-server computational private information retrieval (PIR) protocols for the purpose of preserving client access patterns leakage are orders of magnitude slower than trivially transferring the entire data sets to the inquiring clients. We thus raised the issue of designing efficient PIR mechanisms in practical settings. We introduce exactly s...

متن کامل

Differentially private client-side data deduplication protocol for cloud storage services

Cloud storage service providers apply data client-side deduplication across multiple users to achieve cost savings of network bandwidth and disk storage. However, deduplication can be used as a side channel by attackers who try to obtain sensitive information of other users’ data. We propose a differentially private client-side deduplication protocol. A storage gateway allows efficient data ded...

متن کامل

Secure and Private Cloud Storage Systems with Random Linear Fountain Codes

An information theoretic approach to security and privacy called Secure And Private Information Retrieval (SAPIR) is introduced. SAPIR is applied to distributed data storage systems. In this approach, random combinations of all contents are stored across the network. Our coding approach is based on Random Linear Fountain (RLF) codes. To retrieve a content, a group of servers collaborate with ea...

متن کامل

Achievable Rate of Private Function Retrieval from MDS Coded Databases

We study the problem of private function retrieval (PFR) in a distributed storage system. In PFR the user wishes to retrieve a linear combination of M messages stored in noncolluding (N,K) MDS coded databases while revealing no information about the coefficients of the intended linear combination to any of the individual databases. We present an achievable scheme for MDS coded PFR with a rate t...

متن کامل

A New Model of Data Protection on Cloud Storage

This paper focuses on studying cloud storage data protection model and implementing encrypted storage of user data in double-key form. User data are encrypted with symmetric encryption algorithm and this secret key is encrypted with asymmetric encryption algorithm. The private key is managed and controlled by users. In this way, users guarantee the security of their own data with the sole priva...

متن کامل

A general private information retrieval scheme for MDS coded databases with colluding servers

The problem of private information retrieval gets renewed attentions in recent years due to its information-theoretic reformulation and applications in distributed storage systems. PIR capacity is the maximal number of bits privately retrieved per one bit of downloaded bit. The capacity has been fully solved for some degenerating cases. For a general case where the database is both coded and co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 1996  شماره 

صفحات  -

تاریخ انتشار 1996