Confidentiality preserving scheme for the algorithm raid-pir | Applied Discrete Mathematics. Supplement. 2016. № 9.

Confidentiality preserving scheme for the algorithm raid-pir

We consider the problem of confidentiality of information in the database scheme of private information retrieval from remote servers. It is assumed that r servers are used to store the database (r is odd), and anonymous access to information scheme is used by RAID-PIR scheme. We built encryption method and the distribution of the database so that the encrypted data in each of the storage could not violate the privacy of the information base. Also, we built a read and a rewrite algorithms without violating data confidentiality and anonymity.

Download file
Counter downloads: 210

Keywords

анонимность данных, PIR, 'распределение данных, data anonymity, PIR, data distribution

Authors

NameOrganizationE-mail
Kascheev M. R.South Federal Universitykashcheyewm@gmail.com
Kosolapov Y. V.South Federal Universityitaim@mail.ru
Всего: 2

References

Pfitzmann A. and Hansen M. A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management. https://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.18.pdf. Дата обращения 30.03.2016.
Chor B., Goldreich O., Kushilevitz E., and Sudan M. Private information retrieval // J. ACM. 1998. V. 45(6). P. 965-981.
Demmler D., Herzberg A, and Schneider T. RAID-PIR: Practical Multi-Server PIR // Proc. 6th edition of the ACM Workshop on Cloud Computing Security. N.Y., USA: 2014. P. 45-56.
 Confidentiality preserving scheme for the algorithm raid-pir | Applied Discrete Mathematics. Supplement. 2016. № 9.

Confidentiality preserving scheme for the algorithm raid-pir | Applied Discrete Mathematics. Supplement. 2016. № 9.

Download full-text version
Counter downloads: 1385