Kernekoncepter
Ensuring privacy in aggregate queries through innovative IT-PIR frameworks.
Resumé
The content discusses the importance of protecting user data in aggregate queries to prevent inference of sensitive information. It introduces a novel IT-PIR framework for secure data retrieval and evaluation, showcasing practical applications like social media analysis, flight booking, and stock market data. The article delves into the technical aspects of implementing privacy-enhancing technologies and provides detailed examples of various types of aggregate queries supported by the proposed framework.
Structure:
- Introduction to Privacy Concerns in Data Retrieval
- Overview of Private Information Retrieval (PIR)
- Development of Novel IT-PIR Framework for Aggregate Queries
- Practical Applications and Use Cases
- Threat Model Analysis and Security Measures
- Detailed Explanation of Indexes of Aggregate Queries
- Benchmarking Experiments for Performance Evaluation
Statistik
For instance, in a complex aggregate query to the Twitter microblogging database of 1 million tweets, our protocol takes 0.014 seconds for a PIR server to generate the result when the user is interested in one of ∼3𝑘 user handles.
In contrast, for a much-simplified task, not an aggregate but a positional query, Goldberg’s regular IT-PIR (Oakland 2007) takes 1.13 seconds.
Citater
"An essential part of ensuring privacy for internet service users is to protect what data they access so that the database host cannot infer sensitive information from the query pattern." - Syed Mahbub Hafiz