Revisiting the Computational Practicality of Private Information Retrieval

نویسندگان

  • Femi G. Olumofin
  • Ian Goldberg
چکیده

The retrieval of information from a remote database server typically demands providing the server with some search terms to assist with the retrieval task. However, keeping the search terms private without undermining the server’s ability to retrieve the desired information is a common requirement for many privacy-preservingsystems. Private information retrieval (PIR) provides a cryptographicmeans for retrieving data from a database without the database or database administrator learning any information about which particular item was retrieved. In 2007, Sion and Carbunar considered the practicality of single-server computational PIR schemes and concluded that no existing construction is as efficient as the trivial PIR scheme— the server transferring its entire database to the client. While often cited as evidence that PIR is impractical, that paper did not examine multi-server information-theoretic PIR schemes, which are orders of magnitude more computationally efficient; further, a single-server lattice-based scheme by Aguilar-Melchor and Gaborit has recently been introduced, which is also much more computationally efficient than the schemes examined by Sion and Carbunar. In this paper, we report on a performance analysis of the above single-server lattice-based PIR scheme as well as two multi-server information-theoretic PIR schemes by Chor et al. and by Goldberg. Using analytical and experimental techniques, we find the end-to-end response times of these schemes to be one to three orders of magnitude (10–1000 times) smaller than the trivial scheme for realistic computation powers and network bandwidths. Our result indicates that private information retrieval can indeed be a practical tool for the protection of query privacy in database systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Practicality of Private Information Retrieval

We explore the limits of single-server computational private information retrieval (PIR) for the purpose of preserving client access patterns leakage. We show that deployment of non-trivial single server PIR protocols on real hardware of the recent past would have been orders of magnitude less time-efficient than trivially transferring the entire database. We stress that these results are beyon...

متن کامل

On the Computational Practicality of Private Information Retrieval

We explore the limits of single-server computational private information retrieval (PIR) for the purpose of preserving client access patterns leakage. We show that deployment of non-trivial single server PIR protocols on real hardware of the recent past would have been orders of magnitude less time-efficient than trivially transferring the entire database. We stress that these results are beyon...

متن کامل

PIRMAP: Efficient Private Information Retrieval for MapReduce

Private Information Retrieval (PIR) allows a user to retrieve bits from a database while hiding the user’s access pattern. However, the practicality of PIR in a real-world cloud computing setting has recently been questioned. In such a setting, PIR’s enormous computation and communication overhead is expected to outweigh the cost saving advantages of cloud computing. In this paper, we first exa...

متن کامل

Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR

Private Information Retrieval (PIR) protects users’ privacy in outsourced storage applications and can be achieved using additively homomorphic encryption schemes. Several PIR schemes with a “real world” level of practicality, both in terms of computational and communication complexity, have been recently studied and implemented. One of the possible building block is a conceptually simple and c...

متن کامل

PIRMAP: Efficient Private Information Retrieval for MapReduce

Private Information Retrieval (PIR) allows for retrieval of bits from a database in a way that hides a user’s access pattern from the server. However, its practicality in a real-world cloud computing setting has recently been questioned. In such a setting, PIR’s enormous computation and communication overhead is expected to outweigh any cost saving advantages of cloud computing. This paper pres...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011