The paper proposes a novel hardware-based private information retrieval (HWPIR) protocol. By partially reshuffling previously accessed items in each round, instead of frequently reshuffling the whole database, the s...The paper proposes a novel hardware-based private information retrieval (HWPIR) protocol. By partially reshuffling previously accessed items in each round, instead of frequently reshuffling the whole database, the scheme makes better use of shuffled data copies and achieves the computation overhead at O(/N/K),where N and k are the sizes of the database and secure storage respectively. For securestorage with moderate size, e.g. k = O(/N), the overhead is 0(4/N). The result is much better than the state-of-art schemes (as compared to e.g. O(log2N)). Without increasing response time and communication cost, the proposed protocol is truly practicable regardless of the database size. The security and preformance of the protocol is formally analyzed.展开更多
We introduce a practical method to perform private membership tests.In this method,clients are able to test whether an item is in a set controlled by the server without revealing their query item to the server.After e...We introduce a practical method to perform private membership tests.In this method,clients are able to test whether an item is in a set controlled by the server without revealing their query item to the server.After executing the queries,the content of the server's set remains secret.One use case for a private membership test is to check whether a file contains any malware by checking its signature against a database of malware samples in a privacy-preserving way.We apply the Bloom filter and the Cuckoo filter in the membership test procedure.In order to achieve privacy properties,we present a novel protocol based on some homomorphic encryption schemes.In our protocol,we rearrange the data in the set into N-dimensional hypercubes.We have implemented our method in a realistic scenario where a client of an anti-malware company wants to privately check whether a hash value of a given file is in the malware database of the company.The evaluation shows that our method is feasible for real-world applications.We also have tested the performance of our protocol for databases of different sizes and data structures with different dimensions:2-dimensional,3-dimensional,and 4-dimensional hypercubes.We present formulas to estimate the cost of computation and communication in our protocol.展开更多
In crowded cities,searching for the availability of parking lots is a herculean task as it results in the wastage of drivers’time,increases air pollution,and traffic congestion.Smart parking systems facilitate the dr...In crowded cities,searching for the availability of parking lots is a herculean task as it results in the wastage of drivers’time,increases air pollution,and traffic congestion.Smart parking systems facilitate the drivers to determine the information about the parking lot in real time and book them depending on the requirement.But the existing smart parking systems necessitate the drivers to reveal their sensitive information that includes their mobile number,personal identity,and desired destination.This disclosure of sensitive information makes the existing centralized smart parking systems more vulnerable to service providers’security breaches,single points of failure,and bottlenecks.In this paper,an Improved Asymmetric Consortium Blockchain and Homomorphically Computing Univariate Polynomial-based private information retrieval(IACB-HCUPPIR)scheme is proposed to ensure parking lots’availability with transparency security in a privacy-preserving smart parking system.In specific,an improved Asymmetric Consortium Blockchain is used for achieving secure transactions between different parties interacting in the smart parking environment.It further adopted the method of Homomorphically Computing Univariate Polynomial-based private information retrieval(HCUPPIR)scheme for preserving the location privacy of drivers.The results of IACB-HCUPPIR confirmed better results in terms of minimized computation and communication overload with throughput,latency,and response time with maximized drivers’privacy preservation.Moreover,the proposed fully homomorphic algorithm(FHE)was compared against partial-homomorphic encryption(PHE)and technique without encryption and found that the proposed model has quick communication in allocating the parking slots starting with 24.3 s,whereas PHE starts allocating from 24.7 s and the technique without encryption starts at 27.4 s.Thus,we ensure the proposed model performs well in allocating parking slots with less time and high security with privacy preservation.展开更多
高效的在线字符串模式匹配算法对云数据库检索至关重要,然而搜索内容的泄露会威胁用户隐私。现有的字符串模式匹配算法没有考虑用户搜索内容的保护,可搜索加密方案虽然可以保护用户的搜索内容,但存在索引构建代价大、检索效率低等问题...高效的在线字符串模式匹配算法对云数据库检索至关重要,然而搜索内容的泄露会威胁用户隐私。现有的字符串模式匹配算法没有考虑用户搜索内容的保护,可搜索加密方案虽然可以保护用户的搜索内容,但存在索引构建代价大、检索效率低等问题。因此,提出了两种保护用户搜索内容的模式匹配算法:基于分布式点函数的模式匹配(pattern matching based on distributed point function,PMDPF)算法和基于分布式点函数的跳跃式模式匹配(jumping pattern matching based on distributed point function,JPMDPF)算法。PMDPF算法利用指纹函数以及分布式点函数构造模式串真值表,并分发给两台独立的服务器,把搜索中字符对比操作转换为查表操作,从而保护搜索内容。为了提升搜索效率,提出了JPMDPF算法。通过字符跳转,JPMDPF算法以泄露更多信息为代价,其搜索效率比PMDPF算法平均提高了约m倍,其中m为搜索内容长度,同时显著降低了因指纹函数碰撞而导致的误判的概率。实验结果表明,PMDPF算法的搜索效率比基于指纹函数的经典算法提高约5%,并优于现有的可搜索加密方案,PMDPF算法的搜索耗时在搜索内容长度为4时是JPMDPF算法的4.2倍。展开更多
针对云环境图像认证过程中潜在的泄露数据所有者及用户图像特征隐私的问题,提出了一种基于属性基隐私信息检索(private information retrieval,PIR)的隐私保护云图像认证算法,借助属性基PIR完成密态环境下的隐私图像认证。一方面,云服...针对云环境图像认证过程中潜在的泄露数据所有者及用户图像特征隐私的问题,提出了一种基于属性基隐私信息检索(private information retrieval,PIR)的隐私保护云图像认证算法,借助属性基PIR完成密态环境下的隐私图像认证。一方面,云服务器存储的由数据所有者提供的图像特征被加密,防止云服务器获取数据所有者隐私信息;另一方面,用户在认证时并不需要提供明文的数据特征,并且所提供的加密属性特征也经过泛化处理,最大程度地保护用户隐私。通过性能分析,在理论上证明了所提算法具有较好的隐私保护能力和算法执行效率;通过人脸和虹膜公共数据集进行了模拟实验测试,实验结果和成因分析证明了所提算法相比同类算法更为优越。展开更多
A new method to evaluate fuzzily user's relevance on the basis of cloud models has been proposed. All factors of personalized information retrieval system are taken into account in this method. So using this method f...A new method to evaluate fuzzily user's relevance on the basis of cloud models has been proposed. All factors of personalized information retrieval system are taken into account in this method. So using this method for personalized information retrieval (PIR) system can efficiently judge multi-value relevance, such as quite relevant, comparatively relevant, commonly relevant, basically relevant and completely non-relevant, and realize a kind of transform of qualitative concepts and quantity and improve accuracy of relevance judgements in PIR system. Experimental data showed that the method is practical and valid. Evaluation results are more accurate and approach to the fact better.展开更多
Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, ...Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary's ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval(PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation.展开更多
匿名网络旨在公开网络环境中保护用户通信隐私.自Chaum提出Mix网以来,相关研究在几十年中不断取得进展.如今,匿名网络已发展成以Mix网、DC网或PIR(private information retrieval)为基础,并结合多种设计要素,使之适用于各种应用场景和...匿名网络旨在公开网络环境中保护用户通信隐私.自Chaum提出Mix网以来,相关研究在几十年中不断取得进展.如今,匿名网络已发展成以Mix网、DC网或PIR(private information retrieval)为基础,并结合多种设计要素,使之适用于各种应用场景和威胁模型.从匿名概念出发,介绍匿名网络领域的发展情况,分类阐述代表性研究工作及其设计选择,并系统地从匿名性、延迟和带宽开销等角度进行分析.展开更多
位置隐私和查询内容隐私是LBS兴趣点(point of interest,简称POI)查询服务中需要保护的两个重要内容,同时,在路网连续查询过程中,位置频繁变化会给LBS服务器带来巨大的查询处理负担,如何在保护用户隐私的同时,高效地获取精确查询结果,...位置隐私和查询内容隐私是LBS兴趣点(point of interest,简称POI)查询服务中需要保护的两个重要内容,同时,在路网连续查询过程中,位置频繁变化会给LBS服务器带来巨大的查询处理负担,如何在保护用户隐私的同时,高效地获取精确查询结果,是目前研究的难题.以私有信息检索中除用户自身外其他实体均不可信的思想为基本假设,基于Paillier密码系统的同态特性,提出了无需用户提供真实位置及查询内容的K近邻兴趣点查询方法,实现了对用户位置、查询内容隐私的保护及兴趣点的精确检索;同时,以路网顶点为生成元组织兴趣点分布信息,进一步解决了高强度密码方案在路网连续查询中因用户位置变化频繁导致的实用效率低的问题,减少了用户的查询次数,并能确保查询结果的准确性.最后从准确性、安全性及查询效率方面对本方法进行了分析,并通过仿真实验验证了理论分析结果的正确性.展开更多
文摘The paper proposes a novel hardware-based private information retrieval (HWPIR) protocol. By partially reshuffling previously accessed items in each round, instead of frequently reshuffling the whole database, the scheme makes better use of shuffled data copies and achieves the computation overhead at O(/N/K),where N and k are the sizes of the database and secure storage respectively. For securestorage with moderate size, e.g. k = O(/N), the overhead is 0(4/N). The result is much better than the state-of-art schemes (as compared to e.g. O(log2N)). Without increasing response time and communication cost, the proposed protocol is truly practicable regardless of the database size. The security and preformance of the protocol is formally analyzed.
基金This work was supported in part by Tekes project"Cloudassisted Security Services"grant number 3887/31/2016 and by the Academy of Finland project"Cloud Security Services"(283135).
文摘We introduce a practical method to perform private membership tests.In this method,clients are able to test whether an item is in a set controlled by the server without revealing their query item to the server.After executing the queries,the content of the server's set remains secret.One use case for a private membership test is to check whether a file contains any malware by checking its signature against a database of malware samples in a privacy-preserving way.We apply the Bloom filter and the Cuckoo filter in the membership test procedure.In order to achieve privacy properties,we present a novel protocol based on some homomorphic encryption schemes.In our protocol,we rearrange the data in the set into N-dimensional hypercubes.We have implemented our method in a realistic scenario where a client of an anti-malware company wants to privately check whether a hash value of a given file is in the malware database of the company.The evaluation shows that our method is feasible for real-world applications.We also have tested the performance of our protocol for databases of different sizes and data structures with different dimensions:2-dimensional,3-dimensional,and 4-dimensional hypercubes.We present formulas to estimate the cost of computation and communication in our protocol.
基金The research was funded by the School of Information Technology and Engineering,Vellore Institute of Technology,Vellore 632014,Tamil Nadu,India.
文摘In crowded cities,searching for the availability of parking lots is a herculean task as it results in the wastage of drivers’time,increases air pollution,and traffic congestion.Smart parking systems facilitate the drivers to determine the information about the parking lot in real time and book them depending on the requirement.But the existing smart parking systems necessitate the drivers to reveal their sensitive information that includes their mobile number,personal identity,and desired destination.This disclosure of sensitive information makes the existing centralized smart parking systems more vulnerable to service providers’security breaches,single points of failure,and bottlenecks.In this paper,an Improved Asymmetric Consortium Blockchain and Homomorphically Computing Univariate Polynomial-based private information retrieval(IACB-HCUPPIR)scheme is proposed to ensure parking lots’availability with transparency security in a privacy-preserving smart parking system.In specific,an improved Asymmetric Consortium Blockchain is used for achieving secure transactions between different parties interacting in the smart parking environment.It further adopted the method of Homomorphically Computing Univariate Polynomial-based private information retrieval(HCUPPIR)scheme for preserving the location privacy of drivers.The results of IACB-HCUPPIR confirmed better results in terms of minimized computation and communication overload with throughput,latency,and response time with maximized drivers’privacy preservation.Moreover,the proposed fully homomorphic algorithm(FHE)was compared against partial-homomorphic encryption(PHE)and technique without encryption and found that the proposed model has quick communication in allocating the parking slots starting with 24.3 s,whereas PHE starts allocating from 24.7 s and the technique without encryption starts at 27.4 s.Thus,we ensure the proposed model performs well in allocating parking slots with less time and high security with privacy preservation.
文摘高效的在线字符串模式匹配算法对云数据库检索至关重要,然而搜索内容的泄露会威胁用户隐私。现有的字符串模式匹配算法没有考虑用户搜索内容的保护,可搜索加密方案虽然可以保护用户的搜索内容,但存在索引构建代价大、检索效率低等问题。因此,提出了两种保护用户搜索内容的模式匹配算法:基于分布式点函数的模式匹配(pattern matching based on distributed point function,PMDPF)算法和基于分布式点函数的跳跃式模式匹配(jumping pattern matching based on distributed point function,JPMDPF)算法。PMDPF算法利用指纹函数以及分布式点函数构造模式串真值表,并分发给两台独立的服务器,把搜索中字符对比操作转换为查表操作,从而保护搜索内容。为了提升搜索效率,提出了JPMDPF算法。通过字符跳转,JPMDPF算法以泄露更多信息为代价,其搜索效率比PMDPF算法平均提高了约m倍,其中m为搜索内容长度,同时显著降低了因指纹函数碰撞而导致的误判的概率。实验结果表明,PMDPF算法的搜索效率比基于指纹函数的经典算法提高约5%,并优于现有的可搜索加密方案,PMDPF算法的搜索耗时在搜索内容长度为4时是JPMDPF算法的4.2倍。
文摘针对云环境图像认证过程中潜在的泄露数据所有者及用户图像特征隐私的问题,提出了一种基于属性基隐私信息检索(private information retrieval,PIR)的隐私保护云图像认证算法,借助属性基PIR完成密态环境下的隐私图像认证。一方面,云服务器存储的由数据所有者提供的图像特征被加密,防止云服务器获取数据所有者隐私信息;另一方面,用户在认证时并不需要提供明文的数据特征,并且所提供的加密属性特征也经过泛化处理,最大程度地保护用户隐私。通过性能分析,在理论上证明了所提算法具有较好的隐私保护能力和算法执行效率;通过人脸和虹膜公共数据集进行了模拟实验测试,实验结果和成因分析证明了所提算法相比同类算法更为优越。
文摘A new method to evaluate fuzzily user's relevance on the basis of cloud models has been proposed. All factors of personalized information retrieval system are taken into account in this method. So using this method for personalized information retrieval (PIR) system can efficiently judge multi-value relevance, such as quite relevant, comparatively relevant, commonly relevant, basically relevant and completely non-relevant, and realize a kind of transform of qualitative concepts and quantity and improve accuracy of relevance judgements in PIR system. Experimental data showed that the method is practical and valid. Evaluation results are more accurate and approach to the fact better.
基金supported by the Sharing and Diffusion of National R&D Outcome funded by the Korea Institute of Science and Technology Information
文摘Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary's ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval(PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation.
文摘匿名网络旨在公开网络环境中保护用户通信隐私.自Chaum提出Mix网以来,相关研究在几十年中不断取得进展.如今,匿名网络已发展成以Mix网、DC网或PIR(private information retrieval)为基础,并结合多种设计要素,使之适用于各种应用场景和威胁模型.从匿名概念出发,介绍匿名网络领域的发展情况,分类阐述代表性研究工作及其设计选择,并系统地从匿名性、延迟和带宽开销等角度进行分析.
文摘位置隐私和查询内容隐私是LBS兴趣点(point of interest,简称POI)查询服务中需要保护的两个重要内容,同时,在路网连续查询过程中,位置频繁变化会给LBS服务器带来巨大的查询处理负担,如何在保护用户隐私的同时,高效地获取精确查询结果,是目前研究的难题.以私有信息检索中除用户自身外其他实体均不可信的思想为基本假设,基于Paillier密码系统的同态特性,提出了无需用户提供真实位置及查询内容的K近邻兴趣点查询方法,实现了对用户位置、查询内容隐私的保护及兴趣点的精确检索;同时,以路网顶点为生成元组织兴趣点分布信息,进一步解决了高强度密码方案在路网连续查询中因用户位置变化频繁导致的实用效率低的问题,减少了用户的查询次数,并能确保查询结果的准确性.最后从准确性、安全性及查询效率方面对本方法进行了分析,并通过仿真实验验证了理论分析结果的正确性.