Unobservable surfing on the world wide web: Is private information retrieval an alternative to the MIX based approach?

5Citations
Citations of this article
27Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The technique Private Information Retrieval (PIR) perfectly protects a user’s access pattern to a database. An attacker cannot observe (or determine) which data element is requested by a user and so cannot deduce the interest of the user. We discuss the application of PIR on the World Wide Web and compare it to the MIX approach. We demonstrate particularly that in this context the method does not provide perfect security, and we give a mathematical model for the amount of information an attacker could obtain. We provide an extension of the method under which perfect security can still be achieved.

Cite

CITATION STYLE

APA

Kesdogan, D., Borning, M., & Schmeink, M. (2003). Unobservable surfing on the world wide web: Is private information retrieval an alternative to the MIX based approach? In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2482, pp. 224–238). Springer Verlag. https://doi.org/10.1007/3-540-36467-6_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free