81 research outputs found
The Capacity of Private Information Retrieval from Decentralized Uncoded Caching Databases
We consider the private information retrieval (PIR) problem from
decentralized uncoded caching databases. There are two phases in our problem
setting, a caching phase, and a retrieval phase. In the caching phase, a data
center containing all the files, where each file is of size bits, and
several databases with storage size constraint bits exist in the
system. Each database independently chooses bits out of the total
bits from the data center to cache through the same probability
distribution in a decentralized manner. In the retrieval phase, a user
(retriever) accesses databases in addition to the data center, and wishes
to retrieve a desired file privately. We characterize the optimal normalized
download cost to be . We
show that uniform and random caching scheme which is originally proposed for
decentralized coded caching by Maddah-Ali and Niesen, along with Sun and Jafar
retrieval scheme which is originally proposed for PIR from replicated databases
surprisingly result in the lowest normalized download cost. This is the
decentralized counterpart of the recent result of Attia, Kumar and Tandon for
the centralized case. The converse proof contains several ingredients such as
interference lower bound, induction lemma, replacing queries and answering
string random variables with the content of distributed databases, the nature
of decentralized uncoded caching databases, and bit marginalization of joint
caching distributions.Comment: Submitted for publication, November 201
Secure and Private Cloud Storage Systems with Random Linear Fountain Codes
An information theoretic approach to security and privacy called Secure And
Private Information Retrieval (SAPIR) is introduced. SAPIR is applied to
distributed data storage systems. In this approach, random combinations of all
contents are stored across the network. Our coding approach is based on Random
Linear Fountain (RLF) codes. To retrieve a content, a group of servers
collaborate with each other to form a Reconstruction Group (RG). SAPIR achieves
asymptotic perfect secrecy if at least one of the servers within an RG is not
compromised. Further, a Private Information Retrieval (PIR) scheme based on
random queries is proposed. The PIR approach ensures the users privately
download their desired contents without the servers knowing about the requested
contents indices. The proposed scheme is adaptive and can provide privacy
against a significant number of colluding servers.Comment: 8 pages, 2 figure
- …