Private Location-based Query Processing Using PIR Layla Pournajaf - - PowerPoint PPT Presentation

private location based query processing using pir
SMART_READER_LITE
LIVE PREVIEW

Private Location-based Query Processing Using PIR Layla Pournajaf - - PowerPoint PPT Presentation

Private Location-based Query Processing Using PIR Layla Pournajaf Guest Lecture Data Privacy and Security Nov. 2016 1 Computer Science Department Emory University Motivation I want the list of nearest restaurants 2 Computer Science


slide-1
SLIDE 1
  • Nov. 2016

Private Location-based Query Processing Using PIR

Guest Lecture

Data Privacy and Security

Emory University

Computer Science Department 1

Layla Pournajaf

slide-2
SLIDE 2

Motivation

Emory University Computer Science Department 2

I want the list of nearest restaurants

slide-3
SLIDE 3

Motivation

Emory University Computer Science Department 3

I want the list of nearest restaurants Give me your location first

slide-4
SLIDE 4

Private Information Retrieval

Emory University Computer Science Department 4

Suppose that a server maintains a database consisting of N sequential blocks. PIR protocols enable a client to retrieve the ith block from the server, without the server discovering which block was requested (i.e., index i).

slide-5
SLIDE 5

PIR Implementations

Emory University Computer Science Department 5

  • Computational PIR methods [3] rely on the computational intractability
  • f well-known problems. However, they entail expensive operations linear

in the database size, which lead to prohibitive processing costs (in the

  • rder of thousands of seconds even for moderate database sizes).
  • Secure hardware PIR [4] is currently the only practical PIR mechanism.

It relies on a tamper-resistant CPU that is positioned at the server and is trusted by the clients. This CPU receives a client block request, which is unreadable by the server. It obliviously extracts the requested block from the server’s disk, and returns it to the client in an encrypted form decipherable solely by the client. This paradigm leads to constant communication cost, and amortized polylogarithmic computational cost. The latter translates to processing times close to a second even for Gigabyte databases.

slide-6
SLIDE 6

Private Information Retrieval

Emory University Computer Science Department 6

SYSTEM MODEL SCOP: A trusted secure coprocessor implementation of PIR protocol

PIR- Aware Query Processing

slide-7
SLIDE 7

Location-based Queries Using PIR

Emory University Computer Science Department 7

  • Server-side Indexing of Data
  • Spatial Indexing
  • Compact Storage
  • Enable data retrieval in minimal number of PIR requests
  • Client-side query processing
  • Query processing with minimal information
  • Retrieval of the same number of PIR requests for any query
slide-8
SLIDE 8

Nearest Neighbor Query Using PIR [2]: Server-side Indexing of Data: Voronoi Tessellation

Emory University Computer Science Department 8

slide-9
SLIDE 9

Emory University Computer Science Department 9

Nearest Neighbor Query Using PIR [2]: Server-side Indexing of Data: Voronoi Tessellation

slide-10
SLIDE 10

Nearest Neighbor Query Using PIR [2]

Emory University Computer Science Department

10 10

slide-11
SLIDE 11

Nearest Neighbor Queries Using PIR [2]

Emory University Computer Science Department 11

  • Server-side Indexing of Data
  • Spatial Indexing (Voronoi Tessellation)
  • Efficient Storage (Storage of max 3 points per cell)
  • Data retrieval in minimal number of PIR requests (1 request per

query)

  • Client-side query processing
  • Query processing with minimal information (find the query cell index,

request the index)

  • Retrieval of the same number of PIR requests for any query (1

request per query)

slide-12
SLIDE 12

K-Nearest Neighbor Queries Using PIR [1]

Emory University Computer Science Department 12

slide-13
SLIDE 13

K-Nearest Neighbor Queries Using PIR [1]

Emory University Computer Science Department 13

  • Server-side Indexing of Data
  • Spatial Indexing (Grid Structure)
  • Efficient Storage (Not very efficient (Too many dummy points))
  • Data retrieval in minimal number of PIR requests (Empty cells may

be requested with no use. Too many points in a cell may need several requests)

  • Client-side query processing
  • Query processing with minimal information
  • Retrieval of the same number of PIR requests for any query
slide-14
SLIDE 14

K-Nearest Neighbor Queries Using PIR [1]

Emory University Computer Science Department 14

  • Server-side Indexing of Data
  • Spatial Indexing (Grid Structure)
  • Efficient Storage (Not very efficient (Too many dummy points))
  • Data retrieval in minimal number of PIR requests (Empty cells may

be requested with no use. Too many points in a cell may need several requests)

  • Client-side query processing
  • Query processing with minimal information
  • Retrieval of the same number of PIR requests for any query
slide-15
SLIDE 15

Query Plan

Emory University Computer Science Department 15

  • Goal:
  • Ensuring the same number of PIR requests per query
  • Approach:
  • Finding the maximum number of PIR requests

considering any query point (QP)

  • Regardless of the location of query, all users should

ask for QP blocks

slide-16
SLIDE 16

kNN – Smarter Indexing [1]

Emory University Computer Science Department

16 16

slide-17
SLIDE 17

Query Plan

Emory University Computer Science Department 17

slide-18
SLIDE 18

[1] S. Papadopoulos, S. Bakiras, and D. Papadias, “Nearest neighbor search with strong location privacy,” Proceedings of the VLDB Endowment,

  • vol. 3, no. 1-2, pp. 619–629, 2010.

[2] A. Khoshgozaran, C. Shahabi, and H. Shirani-Mehr, “Location privacy: going beyond k-anonymity, cloaking and anonymizers,” Knowledge and Information Systems, vol. 26, no. 3, pp. 435–465, 2011. [3] G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan, “Private queries in location based services: anonymizers are not necessary,” in Proceedings of the 2008 ACM SIGMOD international conference on Management of data. ACM, 2008, pp. 121–132. [4] P. Williams and R. Sion, “Usable pir.” in NDSS, 2008.

Emory University Computer Science Department

18

References

slide-19
SLIDE 19

Thank You!

Emory University Computer Science Department

19

slide-20
SLIDE 20

 Finding RKNN query without LBS deducing the location

  • f client.

p2 is the nearest neighbor of q p1 and p4 are the reverse nearest neighbors of q

My Research: Reverse k-Nearest Neighbor Queries Using PIR

slide-21
SLIDE 21

 Pruning

 Shrink the search space by removing the points that can not be

the answer

 The remaining points are considered Candidates

 Verification

 Compute kNN for all candidates. For each candidate, if its

kNN includes the query point, it is an answer of RkNN query

Reverse k-Nearest Neighbor Queries

slide-22
SLIDE 22

Pruning Strategies

Emory University Computer Science Department

22 22

slide-23
SLIDE 23

Pruning Strategies

Emory University Computer Science Department

23 23

slide-24
SLIDE 24

Reverse k-Nearest Neighbor Queries Using PIR: Server-Side Indexing Method 1

Emory University Computer Science Department

24 24

 DB_cnt: < c:pre, c:count >  DB_loc: <p.id, p.x, p.y, p.ptr>  DB_dtl: <p:id, p:payload >

slide-25
SLIDE 25

Server

Solution 1 Overview

Client

Emory University Computer Science Department

25

 Aware of grid structure, query plan and DB_cnt  Pruning Phase

 Determine candidate and influenced cells

 Verification Phase

 Retrieve the location coordination and find the results

 Indexing Data

 Create Hilbert curve on fix grid  Create DB_cnt, DB_loc and DB_dtl

 Query Plan

 Uncertain half-plane pruning for uncertain queries  Modified Verification

slide-26
SLIDE 26

Pruning method in Query Plan

Emory University Computer Science Department 26

 Uncertain half-plane pruning for uncertain queries

R

M N O P

Q

D A B E

H’M:B H’P:A H’N:E

H’O:D

C

HM:B HP:A

slide-27
SLIDE 27

Reverse k-Nearest Neighbor Queries Using PIR: Server-Side Indexing Method 2

Emory University Computer Science Department

27 27

 Hilbert-Rtree: hybrid structure based on B+-tree and R-tree  Internal nodes : < MBR, HLV, Ptr >  leaf nodes : < mbr, Pid >  Nodes and points reside in HRT based on their Hilbert number.  nodes are separated based on the largest Hilbert value  In case of overflow in a node, it is handled by applying s, s+1 policy.

slide-28
SLIDE 28

Server

Solution 2 Overview

Client

Emory University Computer Science Department

28

 Aware of Hilbert-Rtree structure, query plan and

level_0 of HRT (< MBR, LHV, c >)

 Pruning Phase  Verification Phase  Indexing Data

 Create Hilbert-Rtree structure  Create DB_loc and DB_dtl

 Query Plan

 Uncertain half-plane pruning for uncertain queries  Modified Verification

Advantage: Instead of probing small cell

  • f Grid, assess the MBR in

which might contain more cells

slide-29
SLIDE 29

Thank You!

Emory University Computer Science Department

29