PIR with Low Storage Overhead: Coding instead of Replication

نویسندگان

  • Arman Fazeli
  • Alexander Vardy
  • Eitan Yaakobi
چکیده

Private information retrieval (PIR) protocols allow a user to retrieve a data item from a database without revealing any information about the identity of the item being retrieved. Specifically, in information-theoretic k-server PIR, the database is replicated among k non-communicating servers, and each server learns nothing about the item retrieved by the user. The cost of PIR protocols is usually measured in terms of their communication complexity, which is the total number of bits exchanged between the user and the servers. However, another important cost parameter is the storage overhead, which is the ratio between the total number of bits stored on all the servers and the number of bits in the database. Since single-server information-theoretic PIR is impossible, the storage overhead of all existing PIR protocols is at least 2 (or k, in the case of k-server PIR). In this work, we show that information-theoretic PIR can be achieved with storage overhead arbitrarily close to the optimal value of 1, without sacrificing the communication complexity. Specifically, we prove that all known k-server PIR protocols can be efficiently emulated, while preserving both privacy and communication complexity but significantly reducing the storage overhead. To this end, we distribute the n bits of the database among s + r servers, each storing n/s coded bits (rather than replicas). Notably, our coding scheme remains the same, regardless of the specific k-server PIR protocol being emulated. For every fixed k, the resulting storage overhead (s + r)/s approaches 1 as s grows; explicitly we have r 6 k √ s ( 1 + o(1) ) . Moreover, in the special case k = 2, the storage overhead is only 1 + s . In order to achieve these results, we introduce and study a new kind of binary linear codes, called here k-server PIR codes. We then show how such codes can be constructed from Steiner systems, from one-step majoritylogic decodable codes, from constant-weight codes, and from certain locally recoverable codes. We also establish several bounds on the parameters of k-server PIR codes, and tabulate the results for all s 6 32 and k 6 16. Finally, we briefly discuss extensions of our results to nonbinary alphabets, to robust PIR, and to t-private PIR.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Report on PIR with Low Storage Overhead

Private information retrieval (PIR) protocol, introduced in 1995 by Chor, Goldreich, Kushilevitz and Sudan, allows a user to retrieve a data item from a database without revealing which item is retrieved. Two main parameters of a PIR protocol are communication complexity, which is the total number of bits communicated between the user and the servers, and storage overhead, which is the ratio be...

متن کامل

Constructions for efficient Private Information Retrieval protocols

Private Information Retrieval (PIR) protocols aim at ensuring a user that he can retrieve some part Di of a distributed database D without revealing the index i to the server(s). Most of known PIR protocols focus on decreasing the communication complexity between the client and the server(s). Recently, the use of PIR codes by Fazeli et. al. also lead to a huge reduction of the storage overhead ...

متن کامل

Multiround Private Information Retrieval: Capacity and Storage Overhead

The capacity has recently been characterized for the private information retrieval (PIR) problem as well as several of its variants. In every case it is assumed that all the queries are generated by the user simultaneously. Here we consider multiround PIR, where the queries in each round are allowed to depend on the answers received in previous rounds. We show that the capacity of multiround PI...

متن کامل

Software as a Service in Cloud Computing

Software as a Service (SaaS) is one of the delivery model of cloud computing in which service are provided by the service providers and client make use of it through Internet. Here we present a saas in pcloud. pcloud is a distributed system which contains a number of cooperated nodes. In pcloud, distribute the programming software to a number of nodes so that queries can be executed in parallel...

متن کامل

Private Information Retrieval from Transversal Designs

Private information retrieval (PIR) protocols allow a user to retrieve entries of a database without revealing the index of the desired item. Information-theoretical privacy can be achieved by the use of several servers and specific retrieval algorithms. Most of known PIR protocols focus on decreasing the number of bits exchanged between the client and the server(s) during the retrieval process...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1505.06241  شماره 

صفحات  -

تاریخ انتشار 2015