Revealing PIR protocols protected users

Rafiullah Khan, Mohib Ullah, Muhammad Arshad Islam

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

7 Citations (Scopus)

Abstract

Privacy preservation is one of the major issue in digital products. In current era, web search engine has become vital tool for internet users. However, most search engines maintains user profile and analyze them which could compromise privacy. In order to preserve the user privacy from a search engine, many privacy preserving solution have been proposed including query obfuscation, anonymizing networks and Peer to Peer Private Information Retrieval Protocols. However, first two solutions cannot preserve user privacy completely and they have their own drawbacks as well, while the Peer-to-Peer Private Information Retrieval protocols are passing through evolution stage. The focus of this paper is to evaluate and quantify the techniques use to preserve privacy by two major protocols of Private Information Retrieval protocols including Useless User Profile and User Private Information Retrieval. In this research association rule mining technique is used to expose the source of query of interest. Each protocol is simulated under varying parameters of Group Size, Number of Query of Interest and association rule mining Window Size over the released data of American Online. The results shows that on the average the proposed adversarial model exposed 85.34% and 80.75% Query of Interest source correctly of Useless User Profile and User Private Information Retrieval protocol respectively. Similarly based on results, it is also concluded that less number of Query of Interest submitted by a user and large groups size offer more protection to the user.

Original languageEnglish
Title of host publication2016 Sixth International Conference on Innovative Computing Technology (INTECH)
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages535-541
Number of pages7
ISBN (Electronic)9781509020003
ISBN (Print)9781509020010
DOIs
Publication statusPublished - 2016
Externally publishedYes
Event6th International Conference on Innovative Computing Technology, INTECH 2016 - Dublin, Ireland
Duration: 24 Aug 201626 Aug 2016

Conference

Conference6th International Conference on Innovative Computing Technology, INTECH 2016
Country/TerritoryIreland
CityDublin
Period24/08/1626/08/16

Keywords

  • PIR
  • Private Information Retrieval
  • Data mining
  • ARM
  • Query Privacy
  • Web Search
  • Search Privacy

Fingerprint

Dive into the research topics of 'Revealing PIR protocols protected users'. Together they form a unique fingerprint.

Cite this