Minimizing Information Leakage under Padding Constraints

09/09/2022
by   Sebastian Simon, et al.
0

An attacker can gain information of a user by analyzing its network traffic. The size of transferred data leaks information about the file being transferred or the service being used, and this is particularly revealing when the attacker has background knowledge about the files or services available for transfer. To prevent this, servers may pad their files using a padding scheme, changing the file sizes and preventing anyone from guessing their identity uniquely. This work focuses on finding optimal padding schemes that keep a balance between privacy and the costs of bandwidth increase. We consider Rényi-min leakage as our main measure for privacy, since it is directly related with the success of a simple attacker, and compare our algorithms with an existing solution that minimizes Shannon leakage. We provide improvements to our algorithms in order to optimize average total padding and Shannon leakage while minimizing Rényi-min leakage. Moreover, our algorithms are designed to handle a more general and important scenario in which multiple servers wish to compute padding schemes in a way that protects the servers' identity in addition to the identity of the files.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/17/2020

Multi-Server Weakly-Private Information Retrieval

Private information retrieval (PIR) protocols ensure that a user can dow...
research
11/09/2021

Optimal Rate-Distortion-Leakage Tradeoff for Single-Server Information Retrieval

Private information retrieval protocols guarantee that a user can privat...
research
03/29/2019

Capacity of Quantum Private Information Retrieval with Collusion of All But One of Servers

Quantum private information retrieval (QPIR) is the problem to retrieve ...
research
08/31/2020

ArchiveSafe: Mass-Leakage-Resistant Storage from Proof-of-Work

Data breaches-mass leakage of stored information-are a major security co...
research
12/07/2020

Generative Adversarial User Privacy in Lossy Single-Server Information Retrieval

We consider the problem of information retrieval from a dataset of files...
research
08/23/2023

Private Information Retrieval with Private Noisy Side Information

Consider Private Information Retrieval (PIR), where a client wants to re...
research
08/31/2021

DLPFS: The Data Leakage Prevention FileSystem

Shared folders are still a common practice for granting third parties ac...

Please sign up or login with your details

Forgot password? Click here to reset