Private Information Retrieval From MDS Coded Data in Distributed Storage Systems

Razane Tajeddine, Oliver W. Gnilke, Salim El Rouayheb

Research output: Contribution to journalArticlepeer-review

54 Scopus citations

Abstract

The problem of providing privacy, in the private information retrieval (PIR) sense, to users requesting data from a distributed storage system (DSS), is considered. The DSS is coded by an (n,k,d) maximum distance separable code to store the data reliably on unreliable storage nodes. Some of these nodes can be spies which report to a third party, such as an oppressive regime, which data is being requested by the user. An information theoretic PIR scheme ensures that a user can satisfy its request while revealing no information on which data is being requested to the nodes. A user can trivially achieve PIR by downloading all the data in the DSS. However, this is not a feasible solution due to its high communication cost. We construct PIR schemes with low download communication cost. When there is b=1 spy node in the DSS, in other words, no collusion between the nodes, we construct PIR schemes with download cost 1/1-R per unit of requested data (R=k/n is the code rate), achieving the information theoretic limit for linear schemes. The proposed schemes are universal since they depend on the code rate, but not on the generator matrix of the code. Also, if b≤n-δk nodes collude, with δ =⌊n-b/k⌋, we construct linear PIR schemes with download cost b+δkδ.

Original languageEnglish (US)
Article number8315137
Pages (from-to)7081-7093
Number of pages13
JournalIEEE Transactions on Information Theory
Volume64
Issue number11
DOIs
StatePublished - Nov 2018

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Computer Science Applications
  • Library and Information Sciences

Keywords

  • Peer-to-peer computing
  • distributed databases
  • information retrieval
  • privacy

Fingerprint Dive into the research topics of 'Private Information Retrieval From MDS Coded Data in Distributed Storage Systems'. Together they form a unique fingerprint.

Cite this