[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1971690.1971697acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmobicaseConference Proceedingsconference-collections
research-article

On query self-submission in peer-to-peer user-private information retrieval

Published: 25 March 2011 Publication History

Abstract

User-private information retrieval (UPIR) is the art of retrieving information without telling the information holder who you are. UPIR is sometimes called anonymous keyword search. This article discusses a UPIR protocol in which the users form a peer-to-peer network over which they collaborate in protecting the privacy of each other. The protocol is known as P2P UPIR. It will be explained why the P2P UPIR protocol may have a flaw in the protection of the privacy of the client in front of the server. Two alternative variations of the protocols are discussed. One of these will prove to resolve the privacy flaw discovered in the original protocol. Hence the aim of this article is to propose a modification of the P2P UPIR protocol. It is justified why the projective planes are still the optimal configurations for P2P UPIR for the modified protocol.

References

[1]
AOL query logs, www.aolstalker.com.
[2]
Bras-Amorós, M. and Stokes, K. (2009) The semigroup of combinatorial configurations, arXiv:0907.4230v3.
[3]
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M. (1998) Private information retrieval, Journal of the ACM, 45:965--981.
[4]
Domingo-Ferrer, J., González-Nicolás, Ú. (2011) Rational Behavior in Peer-to-Peer Profile Obfuscation for Anonymous Keyword Search, Submitted.
[5]
Domingo-Ferrer, J., Bras-Amorós, M. (2008) Peer-to-peer private information retrieval, Domingo-Ferrer, J. and Saygin, Y., editors, Privacy in Statistical Databases, volume 5262 of Lecture Notes in Computer Science, 315--323. Springer.
[6]
Domingo-Ferrer, J., Bras-Amorós, M, Wu, Q., Manjón, J. (2009) User-private information retrieval based on a peer-to-peer community, Data Knowl. Eng., 68(11):1237--1252.
[7]
Gropp, H. (2007) Handbook Of Combinatorial Designs (Charles J. Colbourn and Jeffrey H. Dinitz ed.), chapter Configurations, Chapman and Hall/CRC, Kenneth H. Rosen, 353--355.
[8]
Grünbaum, B.(2009) Configurations of points and lines, Graduate Studies in Mathematics, 103, American Mathematical Society.
[9]
Lee, J., Stinson, D. R. (2008) On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs, ACM Trans. Inf. Syst. Secur. 11(2), Article 5, 35 pages.
[10]
Stokes, K., Bras-Amorós, M. (2010) Optimal configurations for peer-to-peer user-private information retrieval, Computers & Mathematics with Applications, 59(4):1568 -- 1577.
[11]
Stokes, K., Bras-Amorós, M. (2011) Associating a numerical semigroup to the triangle-free configurations, Submitted to Proceedings of Algebraic Combinatorics and Applications (ALCOMA 2010).
[12]
Viejo, A., Castellà-Roca, J. (2010) Using social networks to distort users' profiles generated by web search engines, Computer Networks, 54(9): 1343 -- 1357.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
PAIS '11: Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society
March 2011
62 pages
ISBN:9781450306119
DOI:10.1145/1971690
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 March 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anonymous keyword search
  2. block designs
  3. combinatorial configurations
  4. cryptographic key distribution
  5. user-private information retrieval

Qualifiers

  • Research-article

Funding Sources

Conference

EDBT/ICDT '11

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Private Web Search Using Proxy-Query Based Query Obfuscation SchemeIEEE Access10.1109/ACCESS.2023.323500011(3607-3625)Online publication date: 2023
  • (2022)Proxy-Terms Based Query Obfuscation Technique for Private Web SearchIEEE Access10.1109/ACCESS.2022.314992910(17845-17863)Online publication date: 2022
  • (2018)Data PrivacyData Science in Practice10.1007/978-3-319-97556-6_7(121-132)Online publication date: 20-Sep-2018
  • (2017)Quantification of PIR protocols privacy2017 International Conference on Communication, Computing and Digital Systems (C-CODE)10.1109/C-CODE.2017.7918908(90-95)Online publication date: Mar-2017
  • (2017)User’s PrivacyData Privacy: Foundations, New Developments and the Big Data Challenge10.1007/978-3-319-57358-8_4(89-110)Online publication date: 18-May-2017
  • (2016)Revealing PIR protocols protected users2016 Sixth International Conference on Innovative Computing Technology (INTECH)10.1109/INTECH.2016.7845059(535-541)Online publication date: Aug-2016
  • (2015)Extended results on privacy against coalitions of users in user-private information retrieval protocolsCryptography and Communications10.1007/s12095-015-0125-x7:4(415-437)Online publication date: 1-Dec-2015
  • (2014)A Survey on the Use of Combinatorial Configurations for Anonymous Database SearchAdvanced Research in Data Privacy10.1007/978-3-319-09885-2_22(407-419)Online publication date: 22-Aug-2014
  • (2014)Data privacyWiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery10.1002/widm.11294:4(269-280)Online publication date: 1-Jul-2014
  • (2012)Rational behavior in peer-to-peer profile obfuscation for anonymous keyword searchInformation Sciences: an International Journal10.1016/j.ins.2012.02.067200(123-134)Online publication date: 1-Oct-2012

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media