0% found this document useful (0 votes)
61 views36 pages

Private Information Retrieval: Amir Houmansadr

The document discusses using private information retrieval (PIR) to improve the privacy and scalability of the Tor network. PIR allows a user to privately query a database without revealing which records are being retrieved. This could allow Tor users to download random relay descriptors from directory servers without revealing their specific requests, avoiding route fingerprinting attacks. The document notes that both information-theoretic and computational PIR protocols could potentially be applied.

Uploaded by

Atl trrr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views36 pages

Private Information Retrieval: Amir Houmansadr

The document discusses using private information retrieval (PIR) to improve the privacy and scalability of the Tor network. PIR allows a user to privately query a database without revealing which records are being retrieved. This could allow Tor users to download random relay descriptors from directory servers without revealing their specific requests, avoiding route fingerprinting attacks. The document notes that both information-theoretic and computational PIR protocols could potentially be applied.

Uploaded by

Atl trrr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 36

Content may be borrowed from other resources.

See the last slide for acknowledgements!

Private Information Retrieval


Amir Houmansadr
CS660: Advanced Information Assurance
Spring 2015
AOL search data scandal (2006)

#4417749:
• clothes for age 60
• 60 single men
• best retirement city
• jarrett arnold Thelma Arnold
• jack t. arnold 62-year-old widow
• jaylene and jarrett arnold Lilburn, Georgia
• gwinnett county yellow pages
• rescue of older dogs
• movies for dogs
• sinus infection
Observation
The owners of the database know a lot about the users!

This poses a risk to users’ privacy.

E.g. consider database with stock prices…


Really?
Can we do something about it?

Yes, we can:

• trust them that they will protect our secrecy,


or
• use cryptography!
How can crypto help?

user U database D

Note: this problem has nothing to do with


side-channels, website fingerprinting, etc.
Threat Model

secure link

database D
user U

A new primitive:
Private Information Retrieval (PIR)
Private Information Retrieval (PIR) [CGKS95]

• Goal: allow user to query database while hiding


the identity of the data-items she is after.
• Note: hides identity of data-items; not
existence of interaction with the user.
• Motivation: patient databases; stock quotes;
web access; many more....
• Paradox(?): imagine buying in a store without
the seller knowing what you buy.
(Encrypting requests is useful against third parties; not against
owner of data.)
Model
• Server: holds n-bit string x
n should be thought of as very large

• User: wishes
– to retrieve xi
and
– to keep i private
Private Information Retrieval (PIR)
n ?
4
3
i 7 j

i {1,…n}

xi
x=x1,x2 , . . ., xn {0,1}n

SERVER USER
Non-Private Protocol
xi i {1,…n}

x =x1,x2 , . . ., xn i

SERVER USER

NO privacy!!!
Communication: 1
Trivial Private Protocol
x1,x2 , . . ., xn

x =x1,x2 , . . ., xn xi
SERVER USER

Server sends entire database x to User.


Information theoretic privacy.
Communication: n

Not optimal !
Other solutions?
• User asks for additional random indices.
Drawback: leaks information, reduces
communication efficiency

• Employ general crypto protocols to compute xi


privately.
Drawback: highly inefficient (polynomial in n).

• Anonymity (e.g., via Anonymizers).


Note: different concern: hides identity of user;
not the fact that xi is retrieved.
Two Approaches for PIR
Information-Theoretic PIR [CGKS95,Amb97,...]

Replicate database among k servers.


User queries all the servers

Computational PIR [CG97,KO97,CMS99,...]

Computational privacy, based on cryptographic


assumptions.
Known Comm. Upper Bounds

Multiple servers, information-theoretic PIR:


• 2 servers, comm. n1/3 [CGKS95]
• k servers, comm. n1/(k) [CGKS95, Amb96,…,BIKR02]
• log n servers, comm. Poly( log(n) ) [BF90, CGKS95]

Single server, computational PIR:


Comm. Poly( log(n) )
Under appropriate computational assumptions [KO97,CMS99]

Sub-linear with n
Approach I: k-Server PIR

x  {0,1}n S1 i

x  {0,1}n S2 U

Correctness: User obtains xi

Privacy: No single server


gets information about i
x  {0,1}n Sk
A 2-server Information Theoretical PIR
n

0 1 0 0 1 1 0 1 0 0 1 0

S1 i S2

U
A 2-server Information Theoretical PIR
n

0 1 0 0 1 1 0 1 0 0 1 0

S1 i S2

Q1 subset {1,…,n}
i Ï Q1

U
Protocol I: 2-server PIR
n

0 0 1 0 0 1 1 0 1 0 0 1 0

S1 i S2

a1   x Q1 subset {1,…,n}
i Ï Q1
Q1

U
Protocol I: 2-server PIR
n

0 0 1 0 0 1 1 0 1 0 0 1 0

S1 i S2

Q2=Q1 + {i}

a1   x Q1 subset {1,…,n}
i Ï Q1
Q1

U
Protocol I: 2-server PIR
n

0 0 1 0 0 1 1 0 1 0 0 1 0 1

S1 i S2

Q2=Q1 + {i}

a1   x Q1 subset {1,…,n} a2   x
i Ï Q1 Q2
Q1

U
Weakness: Servers should not collude!
Protocol I: 2-server PIR
n

0 0 1 0 0 1 1 0 1 0 0 1 0 1

S1 i S2

Q2=Q1 + {i}

a1   x Q1 subset {1,…,n} a2   x
i Ï Q1 Q2
Q1

xi =a1 Å a2
i

U
Weakness: Servers should not collude!
Computation PIR
• Only one server, no need to trust

• Based on cryptographic assumptions

• Downside: Server has to run over the whole


database, otherwise leaks information
– High computation load on the server

CS660 - Advanced Information Assurance -


21
UMassAmherst
PIR-Tor: Scalable Anonymous Communication Using
Private Information Retrieval

Prateek Mittal
University of Illinois Urbana-Champaign

Joint work with: Femi Olumofin (U Waterloo)


Carmela Troncoso (KU Leuven)
Nikita Borisov (U Illinois)
Ian Goldberg (U Waterloo)
Original slides from the authors
USENIX Security 2011 22
Tor Background
Directory
Trusted
Servers
Directory
Authority
List of servers?

Middle
Signed
Server list
(relay descriptors)

Exit
Guards
1. Load balancing
2. Exit policy 23
Performance Problem in Tor’s Architecture:
Global View
• Global view
– Not scalable Directory
Servers
List of servers?
Need solutions
without global
system view

Torsk – CCS09 24
Current Solution:
Peer-to-peer Paradigm
• Morphmix [WPES 04]
– Broken [PETS 06]
• Salsa [CCS 06]
– Broken [CCS 08, WPES 09]
• NISAN [CCS 09]
– Broken [CCS 10]
• Torsk [CCS 09]
– Broken [CCS 10]
• ShadowWalker [CCS 09]
– Broken and fixed(??) [WPES 10]

Very hard to argue security of a distributed,


dynamic and complex P2P system. 25
Key Observation
• Need only 18 randomRelay # 10, 25 Directory
Download selected
middle/exit relaysrelay
in 3 descriptors
hours withoutServer
letting directory
– So don’t download
Bob 10: all
IP 2000!
address, key
servers know the information we asked for.
• Naïve approach: 25: IP address,
download a key
• Private Information Retrieval (PIR)
few random relays from
directory servers
– Problem: malicious servers
10 25
– Route fingerprinting attacksUser likely
Inference:
to be Bob

27
Private Information Retrieval (PIR)
• Information theoretic PIR
RA A
– Multi-server protocol
– Threshold number of servers don’t
collude RB
B
RC
• Computational PIR
C Database
– Single server protocol
– Computational assumption on server
A

• Only ITPIR-Tor in this talk RA


Database
– See paper for CPIR-Tor

28
ITPIR-Tor: Database Locations
• Tor places significant trust in guard relays
– 3 compromised guard relays suffice to undermine user anonymity
in Tor.
• Choose client’s guard relays to be directory
servers ExitExit
relay compromised:
relay honest
All
At least
guardone
relays
guard
compromised
relay is honest
Equivalent security toMiddle
the current
Middle Exit
Exit
Tor network
Middle Exit
Deny Service
End-to-end Timing Analysis
Guards ITPIR
ITPIRdoes not provide
guarantees userprivacy
privacy
Guards
Guards But in this case, Tor anonymity broken
29
ITPIR-Tor
Database Organization and Formatting
• Middles, exits Sort by
Relay Bandwidth
– Separate databases
Descriptors
• Exit policies m1 e1
– Standardized exit m2 e2
m3 e3 Exit Policy 1
policies m4 e4
– Relays grouped by exit m5 e5 Exit Policy 2
m6 e6
policies m7 e7
Non-
• Load balancing m8 e8
standard
– Relays sorted by Middles Exits Exit policies
bandwidth

30
ITPIR-Tor Architecture
Guard relays/
PIR Directory servers
Trusted
Directory
Authority
2. Initial connect
1. Download PIR
3. Signed meta-information database
5. 5.18
18PIR Queries(1
middle,18 PIRmiddle/exit)
Query(exit)
6. PIR Response m1 e1
m2 e2
4. Load balanced m3 e3
index selection m4 e4
m5 e5
m6 e6
m7 e7
m8 e8
Middles Exits
31
Performance Evaluation
• Percy [Goldberg, Oakland 2007]
– Multi-server ITPIR scheme
• 2.5 GHz, Ubuntu
• Descriptor size 2100 bytes
– Max size in the current database
• Exit database size
– Half of middle database
• Methodology: Vary number of relays
– Total communication
– Server computation

32
Performance Evaluation:
Communication Overhead

Advantage of PIR-Tor
becomes larger due
to its sublinear
scaling: 100x--1000x
1.1 MB improvement
216 KB

12 KB
Current Tor network:
5x--100x
improvement

33
Performance Evaluation:
Server Computational Overhead

100,000 relays:
about 10 seconds
(does not impact
user latency)

Current Tor
network: less than
0.5 sec

34
Performance Evaluation:
Scaling Scenarios
Scenario Tor ITPIR ITPIR
Communication Communication Core Utilization
(per client) (per client)
Explanation Relay Clients

Current Tor 2,000 250,000 1.1 MB 0.2 MB 0.425 %


10x 20,000 2.5M 11 MB 0.5 MB 4.25 %
relay/client

Clients turn 250,000 250,000 137 MB 1.7 MB 0.425 %


relays

35
Conclusion
• PIR can be used to replace descriptor
download in Tor.
– Improves scalability
• 10x current network size: very feasible
• 100x current network size : plausible
– Easy to understand security properties
• Side conclusion: Yes, PIR can have practical
uses!
• Questions?
36
Acknowledgement
• Some of the slides, content, or pictures are borrowed from
the following resources, and some pictures are obtained
through Google search without being referenced below:

• Stefan Dziembowski, Private Information Retrieval


• Amos Beimel, Private Information Retrieval
• Prateek Mittal, PIR-Tor

CS660 - Advanced Information Assurance -


37
UMassAmherst

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy