TY - GEN
T1 - A comparative evaluation of private information retrieval techniques in location-based services
AU - Costea, Sergiu
AU - Barbu, Dumitru Marian
AU - Ghinita, Gabriel
AU - Rughinis, Razvan
PY - 2012
Y1 - 2012
N2 - Private Information Retrieval (PIR) schemes offer privacy to Internet users by protecting the contents of their queries from the servers that they use. As the problem of user data collected by various services is becoming an issue of increasing concern, the functionality offered by such schemes is gaining a lot of attention. There are various PIR methods that ensure privacy, ranging from information-theoretic secure solutions that require multiple non-colluding servers, to hardware implementations based on secure trusted components. In this paper, we focus on computational PIR (cPIR) techniques which ensure privacy while using only one server and no dedicated hardware modules. Privacy is achieved with the help of encryption that relies on mathematical problems that are computationally intractable. We present an overview of the available cPIR techniques, we identify the major challenges of implementing such schemes, and we evaluate their relative performance. We provide an in-depth analysis of the strengths and weaknesses of cPIR solutions, and present scenarios where each technique is best suited.
AB - Private Information Retrieval (PIR) schemes offer privacy to Internet users by protecting the contents of their queries from the servers that they use. As the problem of user data collected by various services is becoming an issue of increasing concern, the functionality offered by such schemes is gaining a lot of attention. There are various PIR methods that ensure privacy, ranging from information-theoretic secure solutions that require multiple non-colluding servers, to hardware implementations based on secure trusted components. In this paper, we focus on computational PIR (cPIR) techniques which ensure privacy while using only one server and no dedicated hardware modules. Privacy is achieved with the help of encryption that relies on mathematical problems that are computationally intractable. We present an overview of the available cPIR techniques, we identify the major challenges of implementing such schemes, and we evaluate their relative performance. We provide an in-depth analysis of the strengths and weaknesses of cPIR solutions, and present scenarios where each technique is best suited.
KW - Privacy
KW - databases
KW - location based services
KW - private information retrieval
UR - http://www.scopus.com/inward/record.url?scp=84870689246&partnerID=8YFLogxK
U2 - 10.1109/iNCoS.2012.96
DO - 10.1109/iNCoS.2012.96
M3 - Conference contribution
AN - SCOPUS:84870689246
SN - 9780769548081
T3 - Proceedings of the 2012 4th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012
SP - 618
EP - 623
BT - Proceedings of the 2012 4th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012
T2 - 2012 4th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012
Y2 - 19 September 2012 through 21 September 2012
ER -