Private Read Update Write (PRUW) with Storage Constrained Databases

02/07/2022
by   Sajani Vithana, et al.
0

We investigate the problem of private read update write (PRUW) in relation to federated submodel learning (FSL) with storage constrained databases. In PRUW, a user privately reads a submodel from a system of N databases containing M submodels, updates it locally, and writes the update back to the databases without revealing the submodel index or the value of the update. The databases considered in this problem are only allowed to store a given amount of information specified by an arbitrary storage constraint. We provide a storage mechanism that determines the contents of each database prior to the application of the PRUW scheme, such that the total communication cost is minimized. We show that the proposed storage scheme achieves a lower total cost compared to what is achieved by using coded storage or divided storage to meet the given storage constraint.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/07/2023

Private Read Update Write (PRUW) With Heterogeneous Databases

We investigate the problem of private read update write (PRUW) with hete...
research
07/12/2023

Information-Theoretically Private Federated Submodel Learning with Storage Constrained Databases

In federated submodel learning (FSL), a machine learning model is divide...
research
05/31/2022

Private Federated Submodel Learning with Sparsification

We investigate the problem of private read update write (PRUW) in federa...
research
06/08/2023

Fully Robust Federated Submodel Learning in a Distributed Storage System

We consider the federated submodel learning (FSL) problem in a distribut...
research
11/04/2020

Predict and Write: Using K-Means Clustering to Extend the Lifetime of NVM Storage

Non-volatile memory (NVM) technologies suffer from limited write enduran...
research
05/21/2019

Auditable Register Emulations

The widespread prevalence of data breaches amplifies the importance of a...
research
11/17/2021

BigFoot: Exploiting and Mitigating Leakage in Encrypted Write-Ahead Logs

Modern databases and data-warehousing systems separate query processing ...

Please sign up or login with your details

Forgot password? Click here to reset