2009
DOI: 10.1108/14684520910985693
|View full text |Cite
|
Sign up to set email alerts
|

h(k)‐private information retrieval from privacy‐uncooperative queryable databases

Abstract: Purpose-This paper aims to address the privacy problem associated with the use of internet search engines. The purpose of the paper is to propose and validate a set of methods and protocols to guarantee the privacy of users' queries. Design/methodology/approach-In this paper h(k)-private information retrieval (h(k)-PIR) is defined as a practical compromise between computational efficiency and privacy. Also presented are h(k)-PIR protocols that can be used to query any database, which does not even need to know… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
88
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 93 publications
(88 citation statements)
references
References 12 publications
(15 reference statements)
0
88
0
Order By: Relevance
“…For instance, GooPIR [6] adds to the initial query (k − 1) fake queries (generated using a dictionary) where all of these queries are separated by the logical OR operation in a new obfuscated query. As GooPIR's authors consider that an adversary has no background knowledge about the user, this adversary can only guess the initial query with a probability equal to 1/k.…”
Section: Indistinguishability Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…For instance, GooPIR [6] adds to the initial query (k − 1) fake queries (generated using a dictionary) where all of these queries are separated by the logical OR operation in a new obfuscated query. As GooPIR's authors consider that an adversary has no background knowledge about the user, this adversary can only guess the initial query with a probability equal to 1/k.…”
Section: Indistinguishability Solutionsmentioning
confidence: 99%
“…For instance, GooPIR [6] adds extra queries to the original query while TrackMeNot [7] sends periodically fake queries.…”
mentioning
confidence: 99%
“…Pragmatic approaches to guarantee some query privacy have therefore been based so far on two relaxations of PIR: standalone and peer-to-peer (P2P). In the standalone approach, a program running locally in the user's computer either keeps submitting fake queries to cover the user's real queries (TrackMeNot, [12]) or masks the real query keywords with additional fake keywords (GooPIR, [7]). In the P2P approach, a user gets her queries submitted by other users in the P2P community; in this way, the database still learns which item is being retrieved, but it cannot obtain the real query histories of users, which become diffused among the peer users, thereby achieving user-private information retrieval (UPIR).…”
Section: Coprivacy In P2p User-private Information Retrievalmentioning
confidence: 99%
“…Different approaches (e.g., [10,21,8,14,20,13]) have been proposed to tackle this problem. In these systems, the main measure of efficiency is the round complexity, and it is important to construct constant-round PWS systems while guaranteeing privacy.…”
Section: Introductionmentioning
confidence: 99%
“…Another approach to provide privacy during web search is based on a query obfuscation technique (e.g., [10,8,18,3]). Roughly speaking, a class of solutions using query obfuscation is to blend the real queries into a stream of fake queries so that web search engines cannot create a correct profile.…”
Section: Introductionmentioning
confidence: 99%