An efficient user privacy preserving multi-server private information retrieval

Author(s):  
Radhakrishna Bhat ◽  
N R Sunitha
Author(s):  
Hadj Ahmed Bouarara ◽  
Reda Mohamed Hamou ◽  
Amine Abdelmalek

In the last decade, a new paradigm had seen the light named Cloud Computing, which allows the delocalization of data and applications on a dematerialized infrastructure accessible from Internet. Unfortunately, the cloud services are facing many drawbacks especially in terms of security and data confidentiality. However, in a world where digital information is everywhere, finding the desired information has become a crucial problem. For the purpose to preserve the user privacy life new approaches and ideas had been published. The content of this chapter is a new system of bio-inspired private information retrieval (BI-PIR) using the lifestyle of social bees, which allows both to find and hid, the sensitive desired information. It is based on a multi-filters cryptosystem used by the server for the encryption of stored document and the retrieval model using a combination of filters by 3 types of workers bees (Purveyor, guardian and cleaner), the queen bee represents the query, and the hive represents the class of relevant documents. We have tested this system on the benchmark MEDLINE dataset with panoply of validation tools (recall, precision, f-measure, entropy, silence, noise, and accuracy) and a comparative study had been realized with other systems existed in literature. Finally, a 3D visualization tool had been developed in order to make the results in graphical format understandable by humans. Our objectives is to improve the services quality of cloud computing.


2016 ◽  
Vol 30 (25) ◽  
pp. 1650178
Author(s):  
Tian-Yin Wang ◽  
Xiao-Qiu Cai ◽  
Rui-Ling Zhang

We propose two symmetrically-private information retrieval protocols based on quantum key distribution, which provide a good degree of database and user privacy while being flexible, loss-resistant and easily generalized to a large database similar to the precedent works. Furthermore, one protocol is robust to a collective-dephasing noise, and the other is robust to a collective-rotation noise.


Author(s):  
Hsuan-Yin Lin ◽  
Siddhartha Kumar ◽  
Eirik Rosnes ◽  
Alexandre Graell i Amat ◽  
Eitan Yaakobi

Sign in / Sign up

Export Citation Format

Share Document