TY - JOUR
T1 - Private Information Retrieval over Random Linear Networks
AU - Tajeddine, Razane
AU - Wachter-Zeh, Antonia
AU - Hollanti, Camilla
PY - 2019/7/15
Y1 - 2019/7/15
N2 - In this paper, the problem of providing privacy to users requesting data
over a network from a distributed storage system (DSS) is considered.
The DSS, which is considered as the multi-terminal destination of the
network from the user’s perspective, is encoded by a maximum rank
distance (MRD) code to store the data on these multiple servers. A
private information retrieval (PIR) scheme ensures that a user can
request a file without revealing any information on which file is being
requested to any of the servers. In this paper, a novel PIR scheme is
proposed, allowing the user to recover a file from a storage system with
low communication cost, while allowing some servers in the system to
collude in the quest of revealing the identity of the requested file.
The network is modeled as a random linear network, i.e., all nodes of
the network forward random (unknown) linear combinations of incoming
packets. Both error-free and erroneous random linear networks are
considered.
AB - In this paper, the problem of providing privacy to users requesting data
over a network from a distributed storage system (DSS) is considered.
The DSS, which is considered as the multi-terminal destination of the
network from the user’s perspective, is encoded by a maximum rank
distance (MRD) code to store the data on these multiple servers. A
private information retrieval (PIR) scheme ensures that a user can
request a file without revealing any information on which file is being
requested to any of the servers. In this paper, a novel PIR scheme is
proposed, allowing the user to recover a file from a storage system with
low communication cost, while allowing some servers in the system to
collude in the quest of revealing the identity of the requested file.
The network is modeled as a random linear network, i.e., all nodes of
the network forward random (unknown) linear combinations of incoming
packets. Both error-free and erroneous random linear networks are
considered.
KW - Data privacy
KW - Frequency modulation
KW - Information retrieval
KW - Linear codes
KW - Network coding
KW - Servers
KW - Uplink
UR - http://www.scopus.com/inward/record.url?scp=85069893890&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2019.2928483
DO - 10.1109/TIFS.2019.2928483
M3 - Article
AN - SCOPUS:85069893890
SN - 1556-6013
VL - 15
SP - 790
EP - 799
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
IS - 1
ER -