RUS  ENG
Full version
JOURNALS // Proceedings of the Institute for System Programming of the RAS // Archive

Proceedings of ISP RAS, 2023 Volume 35, Issue 5, Pages 37–54 (Mi tisp813)

About cloud request protection

N. P. Varnovskiia, S. A. Martishinb, M. V. Khrapchenkob, A. V. Sokurovb

a Institute for Information Security Issues, Lomonosov Moscow State University
b Ivannikov Institute for System Programming of the RAS

Abstract: The article examines the well-known cryptographic problem of obtaining data from a database by a client so that no one with access to the server except the client himself could obtain information about this request. This problem known as PIR (Private Information Retrieval) was formulated in 1995 by Chor, Goldreich, Kushilevitz and Sudan in the information-theoretic setting. A model of cloud computing is proposed. It includes a cloud, an authentication center, a user, clients, trusted dealer, an active adversary executing the protocol in the cloud. The attacking side has the ability to create fake clients to generate an unlimited number of requests. An algorithm for the organization and database distribution on the cloud and an algorithm for obtaining the required bit were proposed. An injective transformation of bit numbers represented in the $l$-ary number system by words of length $d$ into words without repeating digits of the same length with an alphabet of $\hat l$ digits is used, i.e. a transformation $\{0,\dots, l-1\}^d \to \{0, \dots, \hat l-1\}^d$ was constructed. This transformation reduces the probability of disclosure of the requested bit number. The communication complexity and probability of revealing required bit were estimated, taking into account the performed transformation.

Keywords: database, cloud computing, PIR

DOI: 10.15514/ISPRAS-2023-35(5)-3



© Steklov Math. Inst. of RAS, 2024