The technique Private Information Retrieval (PIR) perfectly protects a user’s access pattern to a database. An attacker cannot observe (or determine) which data element is requested by a user and so cannot deduce the interest of the user. We discuss the application of PIR on the World Wide Web and compare it to the MIX approach. We demonstrate particularly that in this context the method does not provide perfect security, and we give a mathematical model for the amount of information an attacker could obtain. We provide an extension of the method under which perfect security can still be achieved.
CITATION STYLE
Kesdogan, D., Borning, M., & Schmeink, M. (2003). Unobservable surfing on the world wide web: Is private information retrieval an alternative to the MIX based approach? In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2482, pp. 224–238). Springer Verlag. https://doi.org/10.1007/3-540-36467-6_17
Mendeley helps you to discover research relevant for your work.