PIRMAP: Efficient Private Information Retrieval for MapReduce

  • Travis Mayberry
  • Erik-Oliver Blass
  • Agnes Hui Chan
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7859)

Abstract

Private Information Retrieval (PIR) allows a user to retrieve bits from a database while hiding the user’s access pattern. However, the practicality of PIR in a real-world cloud computing setting has recently been questioned. In such a setting, PIR’s enormous computation and communication overhead is expected to outweigh the cost saving advantages of cloud computing. In this paper, we first examine existing PIR protocols, analyzing their efficiency and practicality in realistic cloud settings. We identify shortcomings and, subsequently, present an efficient protocol (PIRMAP) that is particularly suited to MapReduce, a widely used cloud computing paradigm. PIRMAP focuses especially on the retrieval of large files from the cloud, where it achieves good communication complexity with query times significantly faster than previous schemes. To achieve this, PIRMAP enhance related work to allow for optimal parallel computation during the “Map” phase of MapReduce, and homomorphic aggregation in the “Reduce” phase. To improve computational cost, we also employ a new, faster “somewhat homomorphic” encryption, making our scheme practical for databases of useful size while still keeping communication costs low. PIRMAP has been implemented and tested in Amazon’s public cloud with database sizes of up to 1 TByte. Our evaluation shows that non-trivial PIR such as PIRMAP can be more than one order of magnitude cheaper and faster than trivial PIR in the real-world.

Keywords

Privacy MapReduce cloud computing Private Information Retrieval 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aguilar-Melamine, C., Gaborit, P.: A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol (2007), http://eprint.iacr.org/2007/446.pdf
  2. 2.
    Amazon. Elastic MapReduce (2010), http://aws.amazon.com/elasticmapreduce/
  3. 3.
    Blass, E.-O., Di Pietro, R., Molva, R., Önen, M.: PRISM – Privacy-Preserving Search in MapReduce. In: Fischer-Hübner, S., Wright, M. (eds.) PETS 2012. LNCS, vol. 7384, pp. 180–200. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  4. 4.
    Cachin, C., Micali, S., Stadler, M.: Computationally private information retrieval with polylogarithmic communication. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 402–414. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  5. 5.
    Chen, Y., Sion, R.: On securing untrusted clouds with cryptography. In: Workshop on Privacy in the Electronic Society, Chicago, USA, pp. 109–114 (2010)Google Scholar
  6. 6.
    Chor, B., Goldreich, O., Kushilevitz, E.: Private Information Retrieval. In: Proceedings of Symposium on Foundations of Computer Science (1995)Google Scholar
  7. 7.
    Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private Information Retrieval. In: Proceedings of Symposium on Foundations of Computer Science, pp. 41–50 (1995)Google Scholar
  8. 8.
    Dean, J., Ghemawat, S.: MapReduce: Simplified Data Processing on Large Clusters. In: Proceedings of Symposium on Operating System Design and Implementation, San Francisco, USA, pp. 137–150 (2004)Google Scholar
  9. 9.
    Fürer, M.: Faster integer multiplication. In: Proceedings of Symposium on Theory of Computing (1997)Google Scholar
  10. 10.
    Gartner. Gartner Identifies the Top 10 Strategic Technologies for 2011 (2010), http://www.gartner.com/it/page.jsp?id=1454221
  11. 11.
  12. 12.
    Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally-private information retrieval. In: Proceedings of Symposium on Foundations of Computer Science, pp. 364–373 (1997)Google Scholar
  13. 13.
    Lipmaa, H.: An Oblivious Transfer Protocol with Log-Squared Communication. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 314–328. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  14. 14.
    McClure, D.: GSA’s role in supporting development and deployment of cloud computing technology (2010), http://www.gsa.gov/portal/content/159101
  15. 15.
    Nasuni: State of Cloud Storage Providers Industry Benchmark Report (2011), http://cache.nasuni.com/Resources/Nasuni_Cloud_Storage_Benchmark_Report.pdf
  16. 16.
    Olumofin, F., Goldberg, I.: Revisiting the Computational Practicality of Private Information Retrieval. In: Danezis, G. (ed.) FC 2011. LNCS, vol. 7035, pp. 158–172. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  17. 17.
    PIRMAP. Source Code (2012), http://pasmac.ccs.neu.edu
  18. 18.
    Sion, R., Carbunar, B.: On the Computational Practicality of Private Information Retrieval. In: Proceedings of Network and Distributed Systems Security Symposium, San Diego, USA, pp. 1–10 (2007)Google Scholar
  19. 19.
    Symantec. State of Cloud Survey (2011), http://www.symantec.com
  20. 20.
    Trostle, J., Parrish, A.: Efficient computationally private information retrieval from anonymity or trapdoor groups. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 114–128. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  21. 21.
    Whittaker, Z.: Microsoft admits Patriot Act can access EU-based cloud data (2011), http://www.zdnet.com/

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Travis Mayberry
    • 1
  • Erik-Oliver Blass
    • 1
  • Agnes Hui Chan
    • 1
  1. 1.College of Computer and Information ScienceNortheastern UniversityBostonUSA

Personalised recommendations