2003
DOI: 10.1007/3-540-36467-6_17
|View full text |Cite
|
Sign up to set email alerts
|

Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX Based Approach?

Abstract: Abstract.The technique Private Information Retrieval (PIR) perfectly protects a user's access pattern to a database. An attacker cannot observe (or determine) which data element is requested by a user and so cannot deduce the interest of the user. We discuss the application of PIR on the World Wide Web and compare it to the MIX approach. We demonstrate particularly that in this context the method does not provide perfect security, and we give a mathematical model for the amount of information an attacker could… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2004
2004
2021
2021

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…RELATED WORK Pfitzmann and Hansen [45] proposed definitions for privacy-related concepts including unobservability. Unobservability has been interpreted as anonymity or plausible deniability in various systems [8,37], none of which hide the fact that a given user is participating in the system. We do not consider such systems in this paper because they are easily blockable and thus not censorship-resistant.…”
Section: Manipulating Upstream Packetsmentioning
confidence: 99%
“…RELATED WORK Pfitzmann and Hansen [45] proposed definitions for privacy-related concepts including unobservability. Unobservability has been interpreted as anonymity or plausible deniability in various systems [8,37], none of which hide the fact that a given user is participating in the system. We do not consider such systems in this paper because they are easily blockable and thus not censorship-resistant.…”
Section: Manipulating Upstream Packetsmentioning
confidence: 99%
“…Our discussion above focused on the PIR, which itself is a fundamental privacy technology that can enable numerous applications, including PIR-Tor [46], PIR for e-commerce [31], PIR for MIX Nets [35]. Benefits of DP-ORAM extend to other applications as well.…”
Section: Other Applicationsmentioning
confidence: 99%
“…for e-commerce [31], PIR for MIX Nets [35]. Benefits of DP-ORAM extend to other applications as well.…”
Section: Other Applicationsmentioning
confidence: 99%
“…Moreover, as described in Kesdogan et al (2002), classical PIR protocols cannot yet be applied to the web, due not only to computation and communication costs, but also because PIR considers unstructured (“flat”) data, while in the web the data structure can be modelled as a graph (i.e. structured data).…”
Section: Introductionmentioning
confidence: 99%
“…In order to apply PIR to the web environment the hierarchy of the link structure has to be considered and handled when redundant queries are constructed. Kesdogan et al (2002) present a theoretical extension for PIR to the web that is not, however, generally applicable, as it requires redesign of the servers. In our current work we deal with a problem similar to web‐PIR.…”
Section: Introductionmentioning
confidence: 99%