TY - GEN
T1 - Controlling data disclosure in computational PIR protocols
AU - Shang, Ning
AU - Ghinita, Gabriel
AU - Zhou, Yongbin
AU - Bertino, Elisa
PY - 2010
Y1 - 2010
N2 - Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server which is not fully trusted, without disclosing to the server the particular data element retrieved. Several PIR protocols have been proposed, which provide strong guarantees on user privacy. Nevertheless, in many application scenarios it is important to protect the database as well. In this paper, we investigate the amount of data disclosed by the the most prominent PIR protocols during a single run. We show that a malicious user can stage attacks that allow an excessive amount of data to be retrieved from the server. Furthermore, this vulnerability can be exploited even if the client follows the legitimate steps of the PIR protocol, hence the malicious request can not be detected and rejected by the server. We devise mechanisms that limit the PIR disclosure to a single data item.
AB - Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server which is not fully trusted, without disclosing to the server the particular data element retrieved. Several PIR protocols have been proposed, which provide strong guarantees on user privacy. Nevertheless, in many application scenarios it is important to protect the database as well. In this paper, we investigate the amount of data disclosed by the the most prominent PIR protocols during a single run. We show that a malicious user can stage attacks that allow an excessive amount of data to be retrieved from the server. Furthermore, this vulnerability can be exploited even if the client follows the legitimate steps of the PIR protocol, hence the malicious request can not be detected and rejected by the server. We devise mechanisms that limit the PIR disclosure to a single data item.
KW - data disclosure
KW - oblivious transfer
KW - private information retrieval
UR - http://www.scopus.com/inward/record.url?scp=77954491539&partnerID=8YFLogxK
U2 - 10.1145/1755688.1755727
DO - 10.1145/1755688.1755727
M3 - Conference contribution
AN - SCOPUS:77954491539
SN - 9781605589367
T3 - Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010
SP - 310
EP - 313
BT - Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010
T2 - 5th ACM Symposium on Information, Computer and Communication Security, ASIACCS 2010
Y2 - 13 April 2010 through 16 April 2010
ER -