Papers
Topics
Authors
Recent
Search
2000 character limit reached

Deceptive Information Retrieval

Published 10 Jul 2023 in cs.IT, cs.CR, cs.NI, eess.SP, and math.IT | (2307.04727v1)

Abstract: We introduce the problem of deceptive information retrieval (DIR), in which a user wishes to download a required file out of multiple independent files stored in a system of databases while \emph{deceiving} the databases by making the databases' predictions on the user-required file index incorrect with high probability. Conceptually, DIR is an extension of private information retrieval (PIR). In PIR, a user downloads a required file without revealing its index to any of the databases. The metric of deception is defined as the probability of error of databases' prediction on the user-required file, minus the corresponding probability of error in PIR. The problem is defined on time-sensitive data that keeps updating from time to time. In the proposed scheme, the user deceives the databases by sending \emph{real} queries to download the required file at the time of the requirement and \emph{dummy} queries at multiple distinct future time instances to manipulate the probabilities of sending each query for each file requirement, using which the databases' make the predictions on the user-required file index. The proposed DIR scheme is based on a capacity achieving probabilistic PIR scheme, and achieves rates lower than the PIR capacity due to the additional downloads made to deceive the databases. When the required level of deception is zero, the proposed scheme achieves the PIR capacity.

Authors (2)
Definition Search Book Streamline Icon: https://streamlinehq.com
References (21)
  1. Private information retrieval. Journal of the ACM, 45(6):965–981, November 1998.
  2. H. Sun and S. A. Jafar. The capacity of private information retrieval. IEEE Transactions on Information Theory, 63(7):4075–4088, July 2017.
  3. Capacity-achieving private information retrieval codes with optimal message size and upload cost. IEEE Transactions on Information Theory, 65(11):7613–7627, November 2019.
  4. K. Banawan and S. Ulukus. The capacity of private information retrieval from coded databases. IEEE Transactions on Information Theory, 64(3):1945–1956, March 2018.
  5. H. Sun and S. A. Jafar. The capacity of robust private information retrieval with colluding databases. IEEE Transactions on Information Theory, 64(4):2361–2370, April 2018.
  6. Private information retrieval with side information. IEEE Transactions on Information Theory, 66(4):2032–2043, April 2020.
  7. S. Li and M. Gastpar. Single-server multi-message private information retrieval with side information: the general cases. In IEEE ISIT, June 2020.
  8. K. Banawan and S. Ulukus. The capacity of private information retrieval from Byzantine and colluding databases. IEEE Transactions on Information Theory, 65(2):1206–1219, February 2019.
  9. Private information retrieval for secure distributed storage systems. IEEE Transactions on Information Forensics and Security, 13(12):2953–2964, December 2018.
  10. Z. Jia and S. A. Jafar. X𝑋Xitalic_X-secure T𝑇Titalic_T-private information retrieval from MDS coded storage with Byzantine and unresponsive servers. IEEE Transactions on Information Theory, 66(12):7427–7438, December 2020.
  11. K. Banawan and S. Ulukus. Multi-message private information retrieval: Capacity results and near-optimal schemes. IEEE Transactions on Information Theory, 64(10):6842–6862, October 2018.
  12. The capacity of private information retrieval with eavesdroppers. IEEE Transactions on Information Theory, 65(5):3198–3214, May 2019.
  13. Asymmetric leaky private information retrieval. IEEE Transactions on Information Theory, 67(8):5352–5369, August 2021.
  14. On the information leakage in private information retrieval systems. IEEE Transactions on Information Forensics and Security, 15:2999–3012, December 2020.
  15. Deception for cyber defence: Challenges and opportunities. In TPS-ISA, December 2021.
  16. A. Yarali and F. Sahawneh. Deception: Technologies and strategy for cybersecurity. In SmartCloud, December 2019.
  17. C. Faveri and A. Moreira. Designing adaptive deception strategies. In QRS-C, August 2016.
  18. W. Tounsi. Cyber deception, the ultimate piece of a defensive strategy - proof of concept. In CSNet, October 2022.
  19. Software diversity for cyber deception. In IEEE Globecom, December 2020.
  20. On the capacity of leaky private information retrieval. In IEEE ISIT, July 2019.
  21. Semantic private information retrieval. IEEE Transactions on Information Theory, 68(4):2635–2652, April 2022.

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.