The Capacity of Private Information Retrieval From Uncoded Storage Constrained Databases

被引:24
作者
Attia, Mohamed Adel [1 ]
Kumar, Deepak [2 ]
Tandon, Ravi [1 ]
机构
[1] Univ Arizona, Dept Elect & Comp Engn, Tucson, AZ 85719 USA
[2] Citi Bank, Irving, TX 75039 USA
关键词
Private information retrieval; distributed storage; capacity; uncoded storage; storage constrained databases;
D O I
10.1109/TIT.2020.3023016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Private information retrieval (PIR) allows a user to retrieve a desired message from a set of databases without revealing the identity of the desired message. The replicated database scenario, where N databases store each of the K messages was considered by Sun and Jafar, and the optimal download cost was characterized as (1 + 1/N + 1/N-2 + . . . + 1/NK-1). In this work, we consider the problem of PIR from uncoded storage constrained databases. Each database has a storage capacity of mu KL bits, where L is the size of each message in bits, and mu is an element of [1/N, 1] is the normalized storage. The novel aspect of this work is to characterize the optimum download cost of PIR from uncoded storage constrained databases for any "normalized storage" value in the range mu is an element of [1/N, 1]. In particular, for any (N, K), we show that the optimal trade-off between normalized storage, mu, and the download cost, D(mu), is a piece-wise linear function given by the lower convex hull of the N pairs (t/N, 1 + 1/t + 1/t(2) + . . . + 1/t(K-1)) for t = 1, 2,..., N. To prove this result, we first present a storage constrained PIR scheme for any (N, K). Next, we obtain a general lower bound on the download cost for PIR, which is valid for any arbitrary storage architecture. The uncoded storage assumption is then applied which allows us to express the lower bound as a linear program (LP). Finally, we solve the LP to obtain tight lower bounds on the download cost for different regimes of storage, which match the proposed storage constrained PIR scheme.
引用
收藏
页码:6617 / 6634
页数:18
相关论文
共 37 条
[1]   Detecting Forwarding Misbehavior in Clustered IoT Networks [J].
Abhishek, Nalam Venkata ;
Tandon, Anshoo ;
Lim, Teng Joon ;
Sikdar, Biplab .
Q2SWINET'18: PROCEEDINGS OF THE 14TH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2018, :1-6
[2]  
[Anonymous], 2017, ARXIV170503186
[3]   Near Optimal Coded Data Shuffling for Distributed Learning [J].
Attia, Mohamed Adel ;
Tandon, Ravi .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (11) :7325-7349
[4]  
Attia MA, 2018, IEEE INT SYMP INFO, P1959, DOI 10.1109/ISIT.2018.8437729
[5]  
Attia MA, 2018, IEEE INT SYMP INFO, P721, DOI 10.1109/ISIT.2018.8437325
[6]  
Bahrami M, 2017, ANN ALLERTON CONF, P878, DOI 10.1109/ALLERTON.2017.8262831
[7]   Private Information Retrieval Through Wiretap Channel II: Privacy Meets Security [J].
Banawan, Karim ;
Ulukus, Sennur .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (07) :4129-4149
[8]   The Capacity of Private Information Retrieval From Heterogeneous Uncoded Caching Databases [J].
Banawan, Karim ;
Arasli, Batuhan ;
Wei, Yi-Peng ;
Ulukus, Sennur .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (06) :3407-3416
[9]   Asymmetry Hurts: Private Information Retrieval Under Asymmetric Traffic Constraints [J].
Banawan, Karim ;
Ulukus, Sennur .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (11) :7628-7645
[10]   The Capacity of Private Information Retrieval from Byzantine and Colluding Databases [J].
Banawan, Karim ;
Ulukus, Sennur .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (02) :1206-1219