Fundamental Limits of Cache-Aided Private Information Retrieval with Unknown and Uncoded Prefetching

نویسندگان

  • Yi-Peng Wei
  • Karim A. Banawan
  • Sennur Ulukus
چکیده

We consider the problem of private information retrieval (PIR) fromN non-colluding and replicated databases when the user is equipped with a cache that holds an uncoded fraction r from each of the K stored messages in the databases. We assume that the databases are unaware of the cache content. We investigate D∗(r) the optimal download cost normalized with the message size as a function of K, N , r. For a fixed K, N , we develop an inner bound (converse bound) for the D∗(r) curve. The inner bound is a piece-wise linear function in r that consists of K line segments. For the achievability, we develop explicit schemes that exploit the cached bits as side information to achieve K − 1 non-degenerate corner points. These corner points differ in the number of cached bits that are used to generate one side information equation. We obtain an outer bound (achievability) for any caching ratio by memory-sharing between these corner points. Thus, the outer bound is also a piece-wise linear function in r that consists of K line segments. The inner and the outer bounds match in general for the cases of very low caching ratio (r ≤ 1 1+N+N2+···+NK−1 ) and very high caching ratio (r ≥ K−2 (N+1)K+N2−2N−2 ). As a corollary, we fully characterize the optimal download cost caching ratio tradeoff for K = 3. For general K, N , and r, we show that the largest gap between the achievability and the converse bounds is 1 6 . Our results show that the download cost can be reduced beyond memory-sharing if the databases are unaware of the cached content.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cache-Aided Private Information Retrieval with Partially Known Uncoded Prefetching: Fundamental Limits

We consider the problem of private information retrieval (PIR) from N non-colluding and replicated databases, when the user is equipped with a cache that holds an uncoded fraction r of the symbols from each of the K stored messages in the databases. This model operates in a two-phase scheme, namely, the prefetching phase where the user acquires side information and the retrieval phase where the...

متن کامل

Cache-Aided Private Information Retrieval with Partially Known Uncoded Prefetching

We consider the problem of private information retrieval (PIR) from N non-colluding and replicated databases, when the user is equipped with a cache that holds an uncoded fraction r from each of the K stored messages in the databases. This model operates in a two-phase scheme, namely, the prefetching phase where the user acquires side information and the retrieval phase where the user privately...

متن کامل

Private Information Retrieval with Partially Known Private Side Information

We consider the problem of private information retrieval (PIR) of a single message out of K messages from N replicated and non-colluding databases where a cache-enabled user of cache-size M messages possesses side information in the form of full messages that are partially known to the databases. In this model, the user and the databases engage in a two-phase scheme, namely, the prefetching pha...

متن کامل

The Capacity of Private Information Retrieval with Partially Known Private Side Information

We consider the problem of private information retrieval (PIR) of a single message out of K messages from N replicated and non-colluding databases where a cacheenabled user (retriever) of cache-size M possesses side information in the form of full messages that are partially known to the databases. In this model, the user and the databases engage in a two-phase scheme, namely, the prefetching p...

متن کامل

Fundamental Limits of Cloud and Cache-Aided Interference Management with Multi-Antenna Base Stations

In fog-aided cellular systems, content delivery latency can be minimized by jointly optimizing edge caching and transmission strategies. In order to account for the cache capacity limitations at the Edge Nodes (ENs), transmission generally involves both fronthaul transfer from a cloud processor with access to the content library to the ENs, as well as wireless delivery from the ENs to the users...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1709.01056  شماره 

صفحات  -

تاریخ انتشار 2017