Angeliki Aktypi (University of Oxford), Kasper Rasmussen (University of Oxford)

In structured peer-to-peer networks, like Chord, users find data by
asking a number of intermediate nodes in the network. Each node
provides the identity of the closet known node to the address of the
data, until eventually the node responsible for the data is reached.
This structure means that the intermediate nodes learn the address of
the sought after data. Revealing this information to other nodes makes
Chord unsuitable for applications that require query privacy so in
this paper we present a scheme Iris to provide query privacy while
maintaining compatibility with the existing Chord protocol. This means
that anyone using it will be able to execute a privacy preserving
query but it does not require other nodes in the network to use it (or
even know about it).

In order to better capture the privacy achieved by the iterative
nature of the search we propose a new privacy notion, inspired by
$k$-anonymity. This new notion called $(alpha,delta)$-privacy, allows us to formulate
privacy guarantees against adversaries that collude and take advantage
of the total amount of information leaked in all iterations of the
search.

We present a security analysis of the proposed algorithm based on the
privacy notion we introduce. We also develop a prototype of the
algorithm in Matlab and evaluate its performance. Our analysis proves
Iris to be $(alpha,delta)$-private while introducing a modest performance
overhead. Importantly the overhead is tunable and proportional to the
required level of privacy, so no privacy means no overhead.

View More Papers

Rondo: Scalable and Reconfiguration-Friendly Randomness Beacon

Xuanji Meng (Tsinghua University), Xiao Sui (Shandong University), Zhaoxin Yang (Tsinghua University), Kang Rong (Blockchain Platform Division,Ant Group), Wenbo Xu (Blockchain Platform Division,Ant Group), Shenglong Chen (Blockchain Platform Division,Ant Group), Ying Yan (Blockchain Platform Division,Ant Group), Sisi Duan (Tsinghua University)

Read More

AI-Assisted RF Fingerprinting for Identification of User Devices in...

Aishwarya Jawne (Center for Connected Autonomy & AI, Florida Atlantic University), Georgios Sklivanitis (Center for Connected Autonomy & AI, Florida Atlantic University), Dimitris A. Pados (Center for Connected Autonomy & AI, Florida Atlantic University), Elizabeth Serena Bentley (Air Force Research Laboratory)

Read More

Can Public IP Blocklists Explain Internet Radiation?

Simone Cossaro (University of Trieste), Damiano Ravalico (University of Trieste), Rodolfo Vieira Valentim (University of Turin), Martino Trevisan (University of Trieste), Idilio Drago (University of Turin)

Read More

Recurrent Private Set Intersection for Unbalanced Databases with Cuckoo...

Eduardo Chielle (New York University Abu Dhabi), Michail Maniatakos (New York University Abu Dhabi)

Read More