Do You Feel a Chill?: Using PIR against Chilling Effects for Censorship-resistant Publishing

Miti Mazmudar, Stan Gurtler, I. Goldberg
{"title":"Do You Feel a Chill?: Using PIR against Chilling Effects for Censorship-resistant Publishing","authors":"Miti Mazmudar, Stan Gurtler, I. Goldberg","doi":"10.1145/3463676.3485612","DOIUrl":null,"url":null,"abstract":"Peer-to-peer distributed hash tables (DHTs) rely on volunteers to contribute their computational resources, such as disk space and bandwidth. In order to incentivize these node operators of privacy-preserving DHTs, it is important to prevent exposing them to the data that is stored on the DHT and/or queried for. Vasserman et al.'s CROPS aimed at providing plausible deniability to server nodes by encrypting stored content. However, node operators are still exposed to the contents of queries. We provide an architecture that uses information-theoretic private information retrieval to efficiently render a server node incapable of determining what content was retrieved in a given request by a user. We simulate our system and show that it has a small communication and performance overhead over other systems without this privacy guarantee, and significantly smaller overheads than the closest related work.","PeriodicalId":205601,"journal":{"name":"Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society","volume":"228 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3463676.3485612","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Peer-to-peer distributed hash tables (DHTs) rely on volunteers to contribute their computational resources, such as disk space and bandwidth. In order to incentivize these node operators of privacy-preserving DHTs, it is important to prevent exposing them to the data that is stored on the DHT and/or queried for. Vasserman et al.'s CROPS aimed at providing plausible deniability to server nodes by encrypting stored content. However, node operators are still exposed to the contents of queries. We provide an architecture that uses information-theoretic private information retrieval to efficiently render a server node incapable of determining what content was retrieved in a given request by a user. We simulate our system and show that it has a small communication and performance overhead over other systems without this privacy guarantee, and significantly smaller overheads than the closest related work.
你觉得冷吗?:使用PIR对抗审查抵制出版的寒蝉效应
点对点分布式哈希表(dht)依赖于志愿者贡献他们的计算资源,比如磁盘空间和带宽。为了激励这些保护隐私DHT的节点操作符,重要的是要防止将它们暴露给存储在DHT上和/或查询的数据。Vasserman等人的庄稼旨在通过加密存储的内容为服务器节点提供可信的可否认性。但是,节点操作符仍然暴露于查询的内容。我们提供了一种使用信息论私有信息检索的体系结构,以有效地使服务器节点无法确定用户在给定请求中检索了什么内容。我们对我们的系统进行了模拟,结果表明,与没有这种隐私保证的其他系统相比,它的通信和性能开销很小,并且比最接近的相关工作的开销要小得多。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信