Skip to main content
Entropy logoLink to Entropy
. 2024 Mar 10;26(3):244. doi: 10.3390/e26030244

Deceptive Information Retrieval

Sajani Vithana 1, Sennur Ulukus 1,*
Editor: Boris Ryabko1
PMCID: PMC10968959  PMID: 38539757

Abstract

We introduce the problem of deceptive information retrieval (DIR), in which a user wishes to download a required file out of multiple independent files stored in a system of databases while deceiving the databases by making the databases’ predictions on the user-required file index incorrect with high probability. Conceptually, DIR is an extension of private information retrieval (PIR). In PIR, a user downloads a required file without revealing its index to any of the databases. The metric of deception is defined as the probability of error of databases’ prediction on the user-required file, minus the corresponding probability of error in PIR. The problem is defined on time-sensitive data that keep updating from time to time. In the proposed scheme, the user deceives the databases by sending real queries to download the required file at the time of the requirement and dummy queries at multiple distinct future time instances to manipulate the probabilities of sending each query for each file requirement, using which the databases’ make the predictions on the user-required file index. The proposed DIR scheme is based on a capacity achieving probabilistic PIR scheme, and achieves rates lower than the PIR capacity due to the additional downloads made to deceive the databases. When the required level of deception is zero, the proposed scheme achieves the PIR capacity.

Keywords: deception, information retrieval, probabilistic schemes

1. Introduction

Information is generally retrieved from a data storage system by directly requesting what is required. This is the most efficient form of information retrieval in terms of the download cost, as the user only downloads exactly what is required. However, if the user does not want to reveal the required information to the data storage system from which the information is retrieved, extra information must be requested to increase the uncertainty of the databases’ knowledge on the user’s requirement. This is the core idea of private information retrieval (PIR) [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15], where the user downloads a required file out of K independent files stored in N non-colluding databases without revealing the required file index. In PIR, the databases’ prediction of the user-required file based on the received queries is uniformly distributed across all files. Hence, the probability of error of the databases’ predictions in a PIR setting with K files is 11K. In weakly private information retrieval [16,17], a certain amount of information on the user-required file index is revealed to the databases to reduce the download cost. In such cases, as the databases have more information on the file index that the user requests, the error probability of the databases’ prediction is less than 11K. In this work, we study the case where the error probability of databases’ prediction is larger than 11K.

Note that with no information received by the user at all, the databases can make a random guess on the user-required file index, and reach an error probability of 11K. Therefore, to result in a prediction error that is larger than 11K, the user has to deceive the databases by sending fake information on the required file index. The goal of this work is to generate a scheme that allows a user to download a required file k, while forcing the databases’ prediction on the user-required file index to be , where k, for as many cases as possible. This is coined as deceptive information retrieval (DIR). DIR is achieved by sending dummy queries to databases to manipulate the probabilities of sending each query for each file requirement, which results in incorrect predictions at the databases. However, sending dummy queries increases the download cost compared to PIR. Figure 1 shows the behavior of the prediction error probability and the corresponding download costs for different types of information retrieval. (The regions marked as “weakly PIR” and “DIR” in Figure 1 show the points that are conceptually valid for the two cases, and this does not imply that every point in those regions is achievable. The achievable points corresponding to “weakly PIR”, and “DIR” lies within the marked regions.)

Figure 1.

Figure 1

Download costs and prediction error probabilities for different types of information retrieval.

The concept of deception has been studied as a tool for cyber defense [18,19,20,21,22], where the servers deceive attackers, adversaries, and eavesdroppers to eliminate any harmful activities. In all such cases, the deceiver (servers in this case) gains nothing from the deceived, i.e., attackers, adversaries, and eavesdroppers. In contrast, the main challenge in DIR is that what needs to be deceived is the same source of information that the user retrieves the required data from. This limits the freedom that a DIR scheme could employ to deceive the databases. To this end, we formulate the problem of DIR based on the key concepts used in PIR, while also incorporating a time dimension to aid deception.

The problem of DIR introduced in this paper considers a system of non-colluding databases storing K independent files that are time-sensitive, i.e., files that keep updating from time to time. We assume that the databases only store the latest version of the files. A given user wants to download arbitrary files at arbitrary time instances. The correctness condition ensures that the user receives the required file, right at the time of the requirement, while the condition for deception requires the databases’ prediction on the user-required file to be incorrect with a probability that is greater than 11K, specified by the predetermined level of deception required in the system.

The scheme that we propose for DIR deceives the databases by sending dummy queries to the databases for each file requirement, at distinct time instances. From the user’s perspective, each query is designed to play two roles as real and dummy queries, with two different probability distributions. This allows the user to manipulate the overall probability of sending each query for each message requirement, which is known by the databases. The databases make predictions based on the received queries and the globally known probability distribution of the queries used for each file requirement. These predictions are incorrect with probability >11K as the probability distributions based on which the real queries sent are different from the globally known overall distribution. This is the basic idea used in the proposed scheme, which allows a user to deceive the databases while also downloading the required file. The download cost of the proposed DIR scheme increases with the required level of deception d, and achieves the PIR capacity when d=0.

2. Problem Formulation and System Model

We consider N non-colluding databases storing K independent files, each consisting of L uniformly distributed symbols from a finite field Fq, i.e.,

H(W1,,WK)=i=1KH(Wi)=KL, (1)

where Wi is the ith file. The files keep updating from time to time, and a given user wants to download an arbitrary file at arbitrary time instances Ti, iN. We assume that all files are equally probable to be requested by the user.

The user sends queries at arbitrary time instances to download the required file while deceiving the databases. We assume that the databases are unaware of being deceived, which is fundamental to the concept of deception. Moreover, we assume that the databases are only able to store data (files, queries from users, time stamps of received queries, etc.) corresponding to the current time instance, and that the file updates at distinct time instances are mutually independent. Therefore, the user’s file requirements and the queries sent are independent of the stored files at all time instances, i.e.,

I(θ[t],Qn[t];W1:K[t])=0,n{1,,N},t, (2)

where θ[t] is the user’s file requirement, Qn[t] is the query sent by the user to database n, and W1:K[t] is the set of K files, all at times t (The notation 1:K indicates all integers from 1 to K). At any given time t when each database n, n{1,,N}, receives a query from the user, it sends the corresponding answer as a function of the received query and the stored files; thus,

H(An[t]|Qn[t],W1:K[t])=0,n{1,,N}, (3)

where An[t] is the answer received by the user from database n at time t. At each time Ti, iN, the user must be able to correctly decode the required file, that is,

H(Wθ[Ti]|Q1:N[Ti],A1:N[Ti])=0,iN. (4)

At any given time t when each database n, n{1,,N}, receives a query from the user, it makes a prediction on the user-required file index using the maximum a posteriori probability (MAP) estimate as follows,

θ^Q˜[t]=argmaxiP(θ[t]=i|Qn[t]=Q˜),n{1,,N}, (5)

where θ^Q˜[t] is the predicted user-required file index based on the realization of the received query Q˜ at time t. The probability of error of each database’s prediction is defined as

Pe=E[P(θ^Q˜[Ti]θ[Ti])], (6)

where the expectation is taken across all Q˜ and Ti. Note that in PIR, P(θQ˜[t]=i|Qn[t]=Q˜)=P(θQ˜[t]=j|Qn[t]=Q˜) for all i,j{1,,N}, any Q˜[t], which results in PePIR=11K. Based on this information, we define the metric of deception as

D=Pe11K. (7)

For PIR, the amount of deception is D=0, and for weakly PIR, where some amount of information is leaked on the user-required file index, the amount of deception takes a negative value, as the probability of error is smaller than 11K. The goal of this work is to generate schemes that meet a given level of deception D=d>0, while minimizing the normalized download cost, defined as

DL=H(A1:N)L, (8)

where A1:N represents all the answers received by all N databases, corresponding to a single file requirement of the user. The DIR rate is defined as the reciprocal of DL.

3. Main Result

In this section, we present the main result of this paper, along with some remarks. Consider a system of N non-colluding databases containing K identical files. A user is able to retrieve any file k, while deceiving the databases by leaking information about some other file k to the databases.

Theorem 1. 

Consider a system of N non-colluding databases storing K independent files. A required level of deception d, satisfying 0d<(K1)(N1)K(NKN), is achievable at a DIR rate

R=1+NKNN1eϵ1+(NK11)eϵ+NN1(2uu(u+1)α)1, (9)

where

ϵ=lndKN+(K1)(N1)dKN+(K1)(N1)dKNK,α=N+(NKN)eϵ(N1)e2ϵ+(NKN)eϵ+1,u=1α (10)

Remark 1. 

For given N and K, ϵ0 is a one-to-one continuous function of d, the required level of deception, and α(0,1] is a one-to-one continuous function of ϵ. For a given uZ+, there exists a range of values of α, specified by 1u+1<α1u, which corresponds to a unique range of values of ϵ, for which (9) is valid. Since (0,1]={α:1u+1<α1u,uZ+}, there exists an achievable rate (as well as an achievable scheme) for any ϵ0 as well as for any d in the range 0d<(K1)(N1)K(NKN).

Remark 2. 

When the user-specified amount of deception is zero, i.e., d=0, the corresponding values of α and u are α=1 and u=1. The achievable rate for this case is 11N11NK, which is equal to the PIR capacity.

Remark 3. 

The achievable DIR rate monotonically decreases with increasing amount of deception d for any given N and K.

Remark 4. 

The variation in the achievable DIR rate with the level of deception for different numbers of databases when the number of files fixed at K=3 is shown in Figure 2. The achievable rate for different numbers of files when the number of databases is fixed at N=2 is shown in Figure 3. For any given N and K, the rate decreases exponentially when the level of deception is close to the respective upper bound, i.e., d<(K1)(N1)K(NKN).

Figure 2.

Figure 2

Achievable DIR rate for varying levels of deception and different numbers of databases when K=3.

Figure 3.

Figure 3

Achievable DIR rate for varying levels of deception and different numbers of files when N=2.

4. DIR Scheme

The DIR scheme introduced in this section is designed for a system of N non-colluding databases containing K independent files, with a pre-determined amount of deception d>0 required. For each file requirement at time Ti, iN, the user chooses a set of M+1 queries to be sent to database n, n{1,,N}, at time Ti as well as at future time instances ti,j, j{1,,M}, such that each ti,j>Ti. The query sent at time Ti is used to download the required file, while the rest of the M queries are sent to deceive the databases. The queries sent at times Ti, iN and ti,j, j{1,,M}, iN are known as real and dummy queries, respectively. The binary random variable R is used to specify whether a query sent by the user is real or dummy, i.e., R=1 corresponds to a real query sent at time Ti, and R=0 corresponds to a dummy query sent at time ti,j. Next, we define another classification of queries used in the proposed scheme.

Definition 1 

(ϵ-deceptive query). An ϵ-deceptive query Q˜ with respect to file k is defined as a query that always satisfies

P(Qn=Q˜|θ=k,R=1)P(Qn=Q˜|θ=,R=1)=eϵ,P(θ=k|Qn=Q˜)P(θ=|Qn=Q˜)=eϵ,{1,,K},k, (11)

for some ϵ>0, where Qn and θ are the random variables representing a query sent to database n, n{1,,N}, and the user-required file index. An equivalent representation of (11) is given by

P(R=1|θ=)+P(Qn=Q˜|θ=,R=0)P(Qn=Q˜|θ=,R=1)P(R=0|θ=)P(R=1|θ=k)+P(Qn=Q˜|θ=k,R=0)P(Qn=Q˜|θ=k,R=1)P(R=0|θ=k)=e2ϵ,{1,,K},k. (12)

Definition 2 

(PIR query). A query Q˜ that satisfies (11) with ϵ=0 for all k{1,,K}, i.e., a 0-deceptive query, is known as a PIR query.

Remark 5. 

The intuition behind the definition of an ϵ-deceptive query with respect to message k in Definition 1 is as follows. Note that the second equation in (11) fixes the databases’ prediction on the user’s requirement as Wk for the query Q˜. This is because the a posteriori probability corresponding to message k, when Q˜ is received by the databases, is greater than that of any other message , k. However, the first equation in (11), which is satisfied at the same time, ensures that the user sends the query Q˜ with the least probability when the user needs to download message k, compared to the probabilities of sending Q˜ for other message requirements. In other words, since we assume equal priors, the query Q˜ is mostly sent when the user needs to download W for k, and is rarely sent to download Wk, while the databases’ prediction on the user-required message upon receiving query Q˜ is fixed at Wk, which is incorrect with high probability, hence, the deception.

At a given time t, there exists a set of queries consisting of both deceptive and PIR queries, sent to the N databases. Database n, n{1,,N}, is aware of the probability of receiving each query, for each file requirement, i.e., P(Qn=Q˜|θ=k), for k{1,,K}, Q˜Q, where Q is the set of all queries. However, the databases are unaware of being deceived, and are unable to determine whether the received query Q˜ is real or dummy or deceptive or PIR. The proposed scheme generates a list of real and dummy queries for a given N and K along with the probabilities of using them as ϵ-deceptive and PIR queries, based on the required level of deception d. The scheme also characterizes the optimum number of dummy queries M to be sent to the databases for each file requirement, to minimize the download cost. As an illustration of the proposed scheme, consider the following representative examples.

4.1. Example 1: Two Databases and Two Files, N=K=2

In this example, we present how the proposed DIR scheme is applied in a system of two databases containing two files each. In the proposed scheme, the user generates M+1 queries for any given file requirement which consists of one real query and M dummy queries. The user sends the real query at the time of the requirement Ti, and the rest of the M dummy queries at M different future time instances ti,j. Table 1 and Table 2 give possible pairs of real queries that are sent to the two databases to retrieve W1 and W2, respectively, at time Ti, iN. The probability of using each pair of queries is indicated in the first columns of Table 1 and Table 2. Note that the correctness condition in (4) is satisfied at each time Ti, as each row of Table 1 and Table 2 decodes files W1 and W2, respectively, with no error.

Table 1.

Real query table—W1.

P(Q|θ=1,R=1) DB 1 DB 2
p W1 ϕ
p ϕ W1
p W2 W1+W2
p W1+W2 W2

Table 2.

Real query table—W2.

P(Q|θ=2,R=1) DB 1 DB 2
p W2 ϕ
p ϕ W2
p W1 W1+W2
p W1+W2 W1

The dummy queries sent to each database at time ti,j are given in Table 3 and Table 4. The purpose of the dummy queries sent at future time instances is to deceive the databases by manipulating the a posteriori probabilities, which impact their predictions. For example, if the user wants to download W1 at time Ti, the user selects one of the four query options in Table 1 based on the probabilities in column 1 (The values of p and p are derived later in this section), and sends the corresponding queries to databases 1 and 2 at time Ti. Based on the information in Table 3, the user sends the query W1 to both databases at M distinct future time instances ti,j, j{1,,M}.

Table 3.

Dummy query table—W1.

P(Q|θ=1,R=0) DB 1 DB 2
1 W1 W1

Table 4.

Dummy query table—W2.

P(Q|θ=2,R=0) DB 1 DB 2
1 W2 W2

Based on the information in Table 1, Table 2, Table 3 and Table 4, when the user-required file is W1, the probability of each query being received by database n, n{1,2}, at an arbitrary time instance t is calculated as follows. Let P(R=1|θ=i)=α for i{1,2}. (The intuition behind P(R=1|θ=i) is the probability of a query received by any database being real when the user-required file index is i. For a fixed M, P(R=1|θ=i)=1M+1). Then,

P(Qn=W1|θ=1)=P(Qn=W1|θ=1,R=1)P(R=1|θ=1)
 +P(Qn=W1|θ=1,R=0)P(R=0|θ=1) (13)
=pα+1α (14)
P(Qn=W2|θ=1)=P(Qn=W2|θ=1,R=1)P(R=1|θ=1)
 +P(Qn=W2|θ=1,R=0)P(R=0|θ=1) (15)
=pα (16)
P(Qn=W1+W2|θ=1)=P(Qn=W1+W2|θ=1,R=1)P(R=1|θ=1)
 +P(Qn=W1+W2|θ=1,R=0)P(R=0|θ=1) (17)
=pα (18)
P(Qn=ϕ|θ=1)=P(Qn=ϕ|θ=1,R=1)P(R=1|θ=1)
 +P(Qn=ϕ|θ=1,R=0)P(R=0|θ=1) (19)
=pα (20)

Thus, writing these probabilities compactly, we have

P(Qn=W1|θ=1)=pα+1α (21)
P(Qn=W2|θ=1)=pα (22)
P(Qn=W1+W2|θ=1)=pα (23)
P(Qn=ϕ|θ=1)=pα. (24)

Similarly, when the user-required file is W2, the corresponding probabilities are

P(Qn=W1|θ=2)=pα (25)
P(Qn=W2|θ=2)=pα+1α (26)
P(Qn=W1+W2|θ=2)=pα (27)
P(Qn=ϕ|θ=2)=pα. (28)

These queries and the corresponding probabilities of sending them to each database for each message requirement are known to the databases. However, the decomposition of these probabilities based on whether the query is real or dummy, i.e., Table 1, Table 2, Table 3 and Table 4, is not known by the databases. When database n, n{1,,N}, receives a query Q˜ at time t, it calculates the a posteriori probability distribution of the user-required file index, to predict the user’s requirement using (5). The a posteriori probabilities corresponding to the four queries received by database n, n{1,2}, are calculated as follows:

P(θ=i|Qn=Q˜)=P(Qn=Q˜|θ=i)P(θ=i)P(Qn=Q˜). (29)

Then, the explicit a posteriori probabilities are given by

P(θ=1|Qn=W1)=12(pα+1α)P(Qn=W1) (30)
P(θ=2|Qn=W1)=12pαP(Qn=W1) (31)
P(θ=1|Qn=W2)=12pαP(Qn=W2) (32)
P(θ=2|Qn=W2)=12(pα+1α)P(Qn=W2) (33)
P(θ=1|Qn=W1+W2)=12pαP(Qn=W1+W2) (34)
P(θ=2|Qn=W1+W2)=12pαP(Qn=W1+W2) (35)
P(θ=1|Qn=ϕ)=12pαP(Qn=ϕ) (36)
P(θ=2|Qn=ϕ)=12pαP(Qn=ϕ). (37)

While queries ϕ and W1+W2 are PIR queries as stated in Definition 2, queries W1 and W2 are ϵ-deceptive with respect to file indices 1 and 2, respectively, for an ϵ that depends on the required amount of deception d. The values of p and p in Table 1, Table 2, Table 3 and Table 4 are calculated based on the requirements in Definition 1 as follows. It is straightforward to see that p=peϵ follows from the first part of (11) for each query Q˜=W1 and Q˜=W2, which also gives p=12(1+eϵ). The second part of (11) (as well as (12)) results in α=21+eϵ for both ϵ-deceptive queries W1 and W2. Based on the a posteriori probabilities (30)–(37) calculated by the databases using the information in (21)–(28), each database predicts the user’s requirement at each time it receives a query from the user. The predictions corresponding to each query received by database n, n=1,2, which are computed using (5), are shown in Table 5.

Table 5.

Probabilities of each database predicting the user-required file in Example 1.

Query Q˜ P(θ^Q˜=1) P(θ^Q˜=2)
W1 1 0
W2 0 1
W1+W2 12 12
ϕ 12 12

Based on this information, when a database receives query Q=W1, it always decides that the requested message is W1, and when it receives query Q=W2, it always decides that the requested message is W2. For queries Q=ϕ and Q=W1+W2, the databases flip a coin to choose either W1 or W2 as the requested message.

As the queries are symmetric across all databases, the probability of error corresponding to some query Q˜ received by database n at time Ti is given by

P(θ^Q˜[Ti]θ[Ti])
=P(θ[Ti]=1,θ^Q˜[Ti]=2|Qn[Ti]=Q˜)+P(θ[Ti]=2,θ^Q˜[Ti]=1|Qn[Ti]=Q˜) (38)
=1P(Qn[Ti]=Q˜)P(θ^Q˜[Ti]=2|θ[Ti]=1,Qn[Ti]=Q˜)P(Qn[Ti]=Q˜|θ[Ti]=1)P(θ[Ti]=1)
+P(θ^Q˜[Ti]=1|θ[Ti]=2,Qn[Ti]=Q˜)P(Qn[Ti]=Q˜|θ[Ti]=2)P(θ[Ti]=2) (39)
=1P(Qn[Ti]=Q˜)P(θ^Q˜[Ti]=2|Qn[Ti]=Q˜)P(Qn[Ti]=Q˜|θ[Ti]=1)P(θ[Ti]=1)
+P(θ^Q˜=1|Qn[Ti]=Q˜)P(Qn[Ti]=Q˜|θ[Ti]=2)P(θ[Ti]=2), (40)

as the predictions only depend on the received queries. The explicit probabilities corresponding to the four queries are (Note that P(Qn=Q˜|θ[Ti]=i) implies P(Qn=Q˜|θ=i,R=1), as only real queries are sent at time Ti).

P(θ^W1[Ti]θ[Ti])=1P(Qn[Ti]=W1)eϵ4(1+eϵ) (41)
P(θ^W2[Ti]θ[Ti])=1P(Qn[Ti]=W2)eϵ4(1+eϵ) (42)
P(θ^W1+W2[Ti]θ[Ti])=1P(Qn[Ti]=W1+W2)eϵ4(1+eϵ) (43)
P(θ^ϕ[Ti]θ[Ti])=1P(Qn[Ti]=ϕ)14(1+eϵ). (44)

As the same scheme is used for all user requirements at all time instances, the probability of error of each database’s prediction for this example is calculated using (6) as

Pe=Q˜QP(Qn[Ti]=Q˜)P(θ^Q˜[Ti]θ[Ti]) (45)
=3eϵ+14(1+eϵ) (46)

where Q={W1,W2,W1+W2,ϕ}, which results in a deception of D=3eϵ+14(1+eϵ)12=eϵ14(1+eϵ). Therefore, for a required amount of deception d<14, the value of ϵ is chosen as ϵ=ln4d+114d.

The download cost of this scheme is computed as follows. As the scheme is symmetric across all file retrievals, and since the a priori probability distribution of the files is uniform, without loss of generality, we can calculate the download cost of retrieving W1. The download cost of retrieving W1 for a user specified amount of deception d is given by

DL=1L2Lp+2(2L)peϵ+2Lm=0pmm (47)
=1+2eϵ1+eϵ+2E[M] (48)

where pm is the probability of sending m dummy queries per each file requirement. To minimize the download cost, we need to find the probability mass function (PMF) of M which minimizes E[M] such that P(R=1|θ=i)=α=21+eϵ is satisfied for any i. Note that for any i, P(R=1|θ=i) can be written as

P(R=1|θ=i)=α=m=0pm1m+1=E1M+1, (49)

where M is the random variable representing the number of dummy queries sent to each database per file requirement. Thus, the following optimization problem needs to be solved, for a given ϵ, that is a function of the given value of d:

minE[M]s.t.E1M+1=21+eϵ=α. (50)

The solution to this problem is given in Lemma 1, and the resulting minimum download cost is given by

DL=1+2eϵ1+eϵ+4u2u(u+1)α, (51)

where u=1α. When d=0, it follows that ϵ=0 and u=1, and the achievable rate is 23, which is the same as the PIR capacity for N=2 and K=2.

4.2. Example 2: Three Databases and Three Files, N=K=3

Similar to the previous example, the user sends real queries at time Ti and dummy queries at times ti,j, j{1,,M}, for each iN, based on the probabilities shown in Table 6, Table 7, Table 8, Table 9, Table 10 and Table 11. The notation Wij in these tables corresponds to the jth segment of Wi, where each file Wi is divided into N1=2 segments of equal size. Database n, n{1,,N}, only knows the overall probabilities of receiving each query for each file requirement of the user shown in Table 12. These overall probabilities, which are calculated using

P(Qn=Q˜|θ=k)=P(Qn=Q˜|θ=k,R=1)P(R=1|θ=k)+P(Qn=Q˜|θ=k,R=0)P(R=0|θ=k),k{1,,K} (52)

where P(R=1|θ=i)=α for any i=1,2,3, are the same for each database, as the scheme is symmetric across all databases. The entry “other queries” in Table 12 includes all queries that have sums of two or three elements. Based on this available information, each database calculates the a posteriori probability of the user-required file index conditioned on each received query Q˜ using (29). Each query of the form Wkj is an ϵ-deceptive query with respect to file k, where ϵ is a function of the required amount of deception, which is derived towards the end of this section. All other queries including the null query and all sums of two or three elements are PIR queries. As all ϵ-deceptive queries must satisfy (11), the value of p is given by p=peϵ, which results in p=13(1+8eϵ), based on the same arguments used in the previous example. Using (11) and (29) for any given deceptive query, the value of α is calculated as follows. Note that for a query of the form Wkj, for each database n, n{1,,N}, using P(θ=k)=1K, we have

P(θ=k|Qn=Wkj)P(θ=|Q=Wkj)=P(Qn=Wkj|θ=k)P(Qn=Wkj|θ=)=pα+12(1α)pα, (53)

The value of α is computed as α=12p(e2ϵ1)+1, using (11) and (53) by solving pα+12(1α)pα=eϵ.

Table 6.

Real query table—W1.

P(Q|θ=1,R=1) Database 1 Database 2 Database 3
p W11 W12 ϕ
p W12 ϕ W11
p ϕ W11 W12
p W11+W21 W12+W21 W21
p W12+W21 W21 W11+W21
p W21 W11+W21 W12+W21
p W11+W22 W12+W22 W22
p W12+W22 W22 W11+W22
p W22 W11+W22 W12+W22
p W11+W31 W12+W31 W31
p W12+W31 W31 W11+W31
p W31 W11+W31 W12+W31
p W11+W32 W12+W32 W32
p W12+W32 W32 W11+W32
p W32 W11+W32 W12+W32
p W11+W21+W31 W12+W21+W31 W21+W31
p W12+W21+W31 W21+W31 W11+W21+W31
p W21+W31 W11+W21+W31 W12+W21+W31
p W11+W22+W31 W12+W22+W31 W22+W31
p W12+W22+W31 W22+W31 W11+W22+W31
p W22+W31 W11+W22+W31 W12+W22+W31
p W11+W21+W32 W12+W21+W32 W21+W32
p W12+W21+W32 W21+W32 W11+W21+W32
p W21+W32 W11+W21+W32 W12+W21+W32
p W11+W22+W32 W12+W22+W32 W22+W32
p W12+W22+W32 W22+W32 W11+W22+W32
p W22+W32 W11+W22+W32 W12+W22+W32

Table 7.

Dummy query table—W1.

P(Q|θ=1,R=0) DB 1 P(Q|θ=1,R=0) DB 2 P(Q|θ=1,R=0) DB 3
12 W11 12 W11 12 W11
12 W12 12 W12 12 W12

Table 8.

Real query table—W2.

P(Q|θ=2,R=1) Database 1 Database 2 Database 3
p W21 W22 ϕ
p W22 ϕ W21
p ϕ W21 W22
p W11+W21 W11+W22 W11
p W11+W22 W11 W11+W21
p W11 W11+W21 W11+W22
p W12+W21 W12+W22 W12
p W12+W22 W12 W12+W21
p W12 W12+W21 W12+W22
p W21+W31 W22+W31 W31
p W22+W31 W31 W21+W31
p W31 W21+W31 W22+W31
p W21+W32 W22+W32 W32
p W22+W32 W32 W21+W32
p W32 W21+W32 W22+W32
p W11+W21+W31 W11+W22+W31 W11+W31
p W11+W22+W31 W11+W31 W11+W21+W31
p W11+W31 W11+W21+W31 W11+W22+W31
p W11+W21+W32 W11+W22+W32 W11+W32
p W11+W22+W32 W11+W32 W11+W21+W32
p W11+W32 W11+W21+W32 W11+W22+W32
p W12+W21+W31 W12+W22+W31 W12+W31
p W12+W22+W31 W12+W31 W12+W21+W31
p W12+W31 W12+W21+W31 W12+W22+W31
p W12+W21+W32 W12+W22+W32 W12+W32
p W12+W22+W32 W12+W32 W12+W21+W32
p W12+W32 W12+W21+W32 W12+W22+W32

Table 9.

Dummy query table—W2.

P(Q|θ=2,R=0) DB 1 P(Q|θ=2,R=0) DB 2 P(Q|θ=2,R=0) DB 3
12 W21 12 W21 12 W21
12 W22 12 W22 12 W22

Table 10.

Real query table—W3.

P(Q|θ=3,R=1) Database 1 Database 2 Database 3
p W31 W32 ϕ
p W32 ϕ W31
p ϕ W31 W32
p W11+W31 W11+W32 W11
p W11+W32 W11 W11+W31
p W11 W11+W31 W11+W32
p W12+W31 W12+W32 W12
p W12+W32 W12 W12+W32
p W12 W12+W32 W12+W31
p W21+W31 W21+W32 W21
p W21+W32 W31 W21+W31
p W21 W21+W31 W21+W32
p W22+W31 W22+W32 W22
p W22+W32 W22 W22+W31
p W22 W22+W31 W22+W32
p W11+W21+W31 W11+W21+W32 W11+W21
p W11+W21+W32 W11+W21 W11+W21+W31
p W11+W21 W11+W21+W31 W11+W21+W32
p W12+W21+W31 W12+W21+W32 W12+W21
p W12+W21+W32 W12+W21 W12+W21+W31
p W12+W21 W12+W21+W31 W12+W21+W32
p W11+W22+W31 W11+W22+W32 W11+W22
p W11+W22+W32 W11+W22 W11+W22+W31
p W11+W22 W11+W22+W31 W11+W22+W32
p W12+W22+W31 W12+W22+W32 W12+W22
p W12+W22+W32 W12+W22 W12+W22+W31
p W12+W22 W12+W22+W31 W12+W22+W32

Table 11.

Dummy query table—W3.

P(Q|θ=3,R=0) DB 1 P(Q|θ=3,R=0) DB 2 P(Q|θ=3,R=0) DB 3
12 W31 12 W31 12 W31
12 W32 12 W32 12 W32

Table 12.

Queries received by database n, n{1,,N}, at a given time t for each file requirement, and the corresponding probabilities.

Query Q˜ P(Qn=Q˜|θ=1) P(Qn=Q˜|θ=2) P(Qn=Q˜|θ=3)
ϕ pα pα pα
W11 pα+12(1α) pα pα
W12 pα+12(1α) pα pα
W21 pα pα+12(1α) pα
W22 pα pα+12(1α) pα
W31 pα pα pα+12(1α)
W32 pα pα pα+12(1α)
other queries pα pα pα

Assume that the user wants to download W2 at some time Ti. Then, at time Ti, the user picks a row of queries from Table 8 based on the probabilities in the first column, and sends them to each of the three databases. Note that correctness is satisfied, as it is possible to decode W2 from any row of Table 8. Next, the user picks M future time instances ti,j, j{1,,M}, and at each time ti,j the user independently and randomly picks a row from Table 9 and sends the queries to the databases. This completes the scheme, and the value of M that minimizes the download cost is calculated at the end of this example.

The databases make predictions with the received query at each time t, based on the information available in Table 12. As the a posteriori probabilities P(θ=k|Qn=Q˜) are proportional to the corresponding probabilities given by P(Qn=Q˜|θ=k) from (29), the databases’ predictions (using (5)) and the corresponding probabilities are shown in Table 13.

Table 13.

Probabilities of each database predicting the user-required file in Example 2.

Query Q˜ P(θ^Q˜=1) P(θ^Q˜=2) P(θ^Q˜=3)
W11 1 0 0
W12 1 0 0
W21 0 1 0
W22 0 1 0
W31 0 0 1
W32 0 0 1
other queries 13 13 13

The probability of error for each type of query is calculated as follows. First, consider the ϵ-deceptive queries with respect to file k, given by Wkj, j{1,2}. For these queries, the error probability from the perspective of database n, n{1,,N}, is given by

P(θ^Wkj[Ti]θ[Ti])=P(θ[Ti]k|Qn[Ti]=Wkj) (54)
==1,k3P(θ[Ti]=|Qn[Ti]=Wkj) (55)
==1,k3P(Qn[Ti]=Wkj|θ[Ti]=)P(θ[Ti]=)P(Qn[Ti]=Wkj) (56)
=1P(Qn[Ti]=Wkj)23peϵ, (57)

where (54) follows from the fact that the databases’ prediction on a received query of the form Wkj is file k with probability 1 from Table 13, and the probabilities in (57) are obtained from real query tables as they correspond to queries sent at time Ti. Next, the probability of error corresponding to each of the the other queries, i.e., PIR queries that include the null query and sums of two or three elements, is given by

P(θ^Q˜[Ti]θ[Ti])=P(θ^[Ti]θ[Ti]|Qn[Ti]=Q˜) (58)
=j=13m=1,mj3P(θ^[Ti]=m,θ[Ti]=j,Qn[Ti]=Q˜)P(Qn[Ti]=Q˜) (59)
=j=13m=1,mj3P(θ^[Ti]=m|θ[Ti]=j,Qn[Ti]=Q˜)P(Qn[Ti]=Q˜|θ[Ti]=j)P(θ[Ti]=j)P(Qn[Ti]=Q˜) (60)
=1P(Qn[Ti]=Q˜)2p3,ifQ˜=ϕ2peϵ3,ifQ˜ifoftheforms=1Wksjsfor{2,3} (61)

where (61) follows from the fact that θ^[Ti] is conditionally independent of θ[Ti] given Qn, from (5). The probability of error at each time Ti, iN, is the same, as the scheme is identical at each Ti, and across all file requirements. Therefore, the probability of error of each database’s prediction using (6) is given by

Pe=P(θ^[Ti]θ[Ti]) (62)
=Q˜QP(Qn=Q˜)P(θ^Q˜[Ti]θ[Ti]) (63)
=k=13j=12P(Qn=Wkj)1P(Qn[Ti]=Wkj)23peϵ+P(Qn=ϕ)1P(Qn=ϕ)2p3
+20P(Qn=Q^)1P(Qn=Q^)2peϵ3 (64)
=4peϵ+2p3+40peϵ3 (65)
=52eϵ+29(8eϵ+1). (66)

where Q is the set of all queries and Q^ is a query of the form s=1Wksjs for {2,3}. The resulting amount of deception is,

D=Pe11K=52eϵ+29(8eϵ+1)23=4(eϵ1)9(8eϵ+1). (67)

Therefore, for a required amount of deception d<118, ϵ is chosen as ϵ=ln9d+44(118d).

Without loss of generality, consider the cost of downloading W1, which is the same as the expected download cost, as the scheme is symmetric across all file retrievals.

DL=1LL×3p+3L2×24peϵ+3L2m=0pmm=1+12eϵ1+8eϵ+32E[M] (68)

To find the scheme that achieves the minimum DL, we need to find the minimum E[M] that satisfies P(R=1|θ=i)=α=E[1M+1]=3(1+8eϵ)2e2ϵ+24eϵ+1, i.e., the following optimization problem needs to be solved.

minE[M]s.t.E1M+1=3e2ϵ(1+8eϵ)2+e2ϵ+24eϵ. (69)

The solution to this problem is given in Lemma 1. The resulting minimum download cost for a given value of ϵ, i.e., required level of deception d, is given by

DϵL=1+12eϵ1+8eϵ+32(2uu(u+1)α),α=3e2ϵ(1+8eϵ)2+e2ϵ+24eϵ, (70)

where u=1α. When d=0, it follows that ϵ=0, α=1, and u=1, and the achievable rate is 913, which is equal to the PIR capacity for the case N=3,K=3.

4.3. Generalized DIR Scheme for Arbitrary N and K

In the general DIR scheme proposed in this work, at each time Ti, iN, when the user needs to download some file Wk, the user sends a set of real queries to each of the N databases. These queries are picked based on a certain probability distribution, defined on all possible sets of real queries. For the same file requirement, the user sends M dummy queries at future time instances ti,j, j{1,,M}, where ti,j>Ti. The dummy queries sent at each time ti,j are randomly selected from a subset of real queries. We assume that the databases are unaware of being deceived, and treat both real and dummy queries the same when calculating their predictions on the user-required file index at each time they receive a query. The overall probabilities of a given user sending each query for each file requirement are known by the databases. However, the decomposition of these probabilities based on whether each query is used as a real or a dummy query is not known by the databases. It is also assumed that the databases only store the queries received at the current time instance.

The main components of the general scheme include (1) NK possible sets of real queries to be sent to the N databases for each file requirement and their probabilities, (2) N1 possible sets of dummy queries and their probabilities, (3) overall probabilities of sending each query for each of the K file requirements of the user. Note that (1) and (2) are only known by the user, while (3) is known by the databases.

As shown in the examples considered, the set of all possible real queries takes the form of the queries in the probabilistic PIR scheme in [23,24], with a non-uniform probability distribution, unlike in PIR. The real query table used when retrieving Wk consists of the following queries:

  1. Single blocks: Wk is divided into N1 parts, and each part is requested from N1 databases, while requesting nothing ϕ from the remaining database. All cyclic shifts of these queries are considered in the real query table.

  2. Sums of two blocks/Single block: One database is used to download Wjl, l{1,,N1},jk and each one in the rest of the N1 databases is used to download Wkr+Wjl for each r{1,,N1}. All cyclic shifts of these queries are also considered as separate possible sets of queries.

  3. Sums of three/Two blocks: One database is used to download Wj11+Wj22, 1,2{1,,N1} and j1j2k. Each one in the rest of the N1 databases is used to download Wj1l1+Wj2l2+Wkr for each r{1,,N1}. All cyclic shifts of these queries are also considered as separate possible sets of queries.

  4. Sums of K and K1 blocks: The above process is repeated for all sums of blocks until K/K1.

Out of the NK different sets of queries described above in the real query table, all queries except ϕ in single blocks, i.e., queries of the form Wk, {1,,N1}, are chosen as ϵ-deceptive ones with respect to file k, for each k{1,,K}, and are included in the set of dummy queries sent to databases when the user-required file index is k. The N1ϵ-deceptive queries Wkr, r{1,,N1}, corresponding to the kth file requirement, must guarantee the condition in (11). For that, we assign

P(Qn=Wkr|θ=k,R=1)=p,r{1,,N1} (71)

and

P(Qn=Wkr|θ=j,R=1)=peϵ,r{1,,N1},jk, (72)

for each database n, n{1,,N}. The rest of the queries, i.e., ϕ and sums of blocks where {2,,K}, are PIR queries in the proposed scheme. Note that the query ϕ is always coupled with the ϵ-deceptive queries with respect to file index k (required file) for correctness (see Table 6, Table 8 and Table 10). Thus, ϕ is assigned the corresponding probability given by

P(Qn=ϕ|θ=m,R=1)=p,m{1,,K},n{1,,N}. (73)

Similarly, as the rest of the PIR queries are coupled with ϵ-deceptive queries with respect to file indices j, jk, or with other PIR queries, they are assigned the corresponding probability given by

P(Qn=Q^|θ=m,R=1)=peϵ,m{1,,K},n{1,,N}, (74)

where Q^ is any PIR query in the form of ℓ-sums with {2,,K}. Since the probabilities of the real queries sent for each file requirement must add up to one, i.e., Q˜QP(Qn=Q˜|θ=m,R=1)=1 for each m{1,,K}, p is given by

p=1N+(NKN)eϵ, (75)

as there are N query sets in the real query table with probability p, and NKN sets with probability peϵ. Each ϵ-deceptive query with respect to file index k is chosen with equal probability to be sent to the databases as dummy queries at times ti,j when the file requirement at the corresponding time Ti is Wk. Since there are N1 deceptive queries,

P(Qn=Wkr|θ=k,R=0)=1N1,r{1,,N1} (76)

and

P(Qn=Wkr|θ=j,R=0)=0,r{1,,N1},jk (77)

for each database n, n{1,,N}. Therefore, for all ϵ-deceptive queries with respect to file index k of the form Wki, the condition in (12) can be written as

αα+1p(N1)(1α)=e2ϵ (78)

thus,

α=1p(N1)(e2ϵ1)+1=N+(NKN)eϵ(N1)e2ϵ+(NKN)eϵ+1, (79)

which characterizes α=E1M+1. The information available to database n, n{1,,N}, is the overall probability of receiving each query for each file requirement of the user P(Qn=Q˜|θ=k), k{1,,K}, given by

P(Qn=Q˜|θ=k)=P(Qn=Q˜|θ=k,R=1)P(R=1|θ=k)+P(Qn=Q˜|θ=k,R=0)P(R=0|θ=k). (80)

For ϵ-deceptive queries with respect to file index k, i.e., Wkj, j{1,,N1}, the overall probability in (80) from the perspective of database n, n{1,,N}, is given by

P(Qn=Wkj|θ=)=αp+1αN1=e2ϵ(N1)(e2ϵ1)+N+(NKN)eϵ,=kαpeϵ=eϵ(N1)(e2ϵ1)+N+(NKN)eϵ,k. (81)

The probability of sending the null query ϕ to database n, n{1,,N}, for each file requirement k, k{1,,K}, is

P(Qn=ϕ|θ=k)=αp=1(N1)(e2ϵ1)+N+(NKN)eϵ. (82)

For the rest of the PIR queries denoted by Q^, i.e., queries of the form s=1Wisjs for {2,,K}, the overall probability in (80), known by each database n, n{1,,N} for each file requirement k, k{1,,K}, is given by

P(Qn=Q^|θ=k)=αpeϵ=eϵ(N1)(e2ϵ1)+N+(NKN)eϵ. (83)

Based on the query received at a given time t, each database n, n{1,,N}, calculates the a posteriori probability of the user-required file index being k, k{1,,K}, using

P(θ=k|Qn=Q˜)=P(Qn=Q˜|θ=k)P(θ=k)P(Qn=Q˜). (84)

Since we assume uniform priors, i.e., P(θ=k)=1K for all k{1,,K}, the posteriors are directly proportional to P(Qn=Q˜|θ=k) for each Q˜. Therefore, the databases predict the user-required file index for each query received using (5) and (81)–(83). For example, when the query W11 is received, it is clear that the maximum P(θ=k|Qn=W11) in (5) is obtained for k=1 from (81) and (84). The prediction corresponding to any query received is given in Table 14 along with the corresponding probability of choosing the given prediction (The superscript j in the first column of Table 14 corresponds to any index in the set {1,.N1}).

Table 14.

Probabilities of each database predicting the user-required file.

Query Q˜ P(θ^Q˜=1) P(θ^Q˜=2) P(θ^Q˜=3) P(θ^Q˜=K)
W1j 1 0 0 0
W2j 0 1 0 0
W3j 0 0 1 0
WKj 0 0 0 1
other queries 1K 1K 1K 1K

Based on the information in Table 14, the probability of error when a database n, n{1,,N}, receives the query Wk at some time Ti is given by

P(θ^Wk[Ti]θ[Ti])=P(θ[Ti]k|Qn[Ti]=Wk) (85)
=j=1,jkKP(θ[Ti]=j|Qn[Ti]=Wk) (86)
=j=1,jkKP(Qn[Ti]=Wk|θ[Ti]=j)P(θ[Ti]=j)P(Qn[Ti]=Wk) (87)
=1Kpeϵ(K1)P(Qn[Ti]=Wk), (88)

where (88) follows from the fact that the user sends real queries based on the probabilities P(Qn=Q˜|θ=k,R=1) at time Ti.

For all other queries Q˜, the corresponding probability of error is given by

P(θ^Q˜[Ti]θ[Ti])=P(θ^[Ti]θ[Ti]|Qn[Ti]=Q˜) (89)
=j=1Km=1,mjKP(θ^[Ti]=m,θ[Ti]=j,Qn[Ti]=Q˜)P(Qn[Ti]=Q˜) (90)
=j=1Km=1,mjKP(θ^[Ti]=m|θ[Ti]=j,Qn[Ti]=Q˜)P(Qn[Ti]=Q˜|θ[Ti]=j)P(θ[Ti]=j)P(Qn[Ti]=Q˜) (91)
=1P(Qn[Ti]=Q˜)(K1)pK,ifQ˜=ϕ(K1)peϵK,ifQ˜oftheforms=1Wisjs,{2,,K} (92)

where (92) follows from the fact that θ^[Ti] is conditionally independent of θ[Ti] given Q from (5). The probability of error of each database’s prediction is given by

Pe=Q˜P(Qn[Ti]=Q˜)P(θ^[Ti]θ[Ti]|Q[Ti]=Q˜) (93)
=k=1K=1N1P(Qn[Ti]=Wk)1Kpeϵ(K1)P(Qn[Ti]=Wk)+P(Qn[Ti]=ϕ)1K(K1)pP(Qn[Ti]=ϕ)
+(NK1K(N1))P(P(Qn[Ti]=Q^)1K(K1)peϵP(Qn[Ti]=Q^)) (94)
=peϵ(K1)(N1)+(K1)pK+(K1)peϵ(NK1K(N1))K (95)
=(K1)(1+eϵ(NK1))K(N+(NKN)eϵ), (96)

where Q^ in (94) represents the queries of the form s=1Wisjs for {2,,K}. Note that P(Qn[Ti]=Q^) is the same for each Q^ as P(Qn[Ti]=Q^|θ=j)=peϵ for each Q^ and all j{1,,K} from (74). Thus, the amount of deception achieved by this scheme for a given ϵ is given by

D=Pe11K=(K1)(N1)(eϵ1)K(N+(NKN)eϵ). (97)

Therefore, for a required amount of deception d, satisfying d<(K1)(N1)K(NKN), the value of ϵ must be chosen as

ϵ=lndKN+(K1)(N1)dKN+(K1)(N1)dKNK. (98)

The download cost of the general scheme is

DL=1LNpL+(NKN)peϵNLN1+NLN1E[M] (99)
DL=Np+N(NKN)N1peϵ+NN1E[M] (100)
DL=NN111N+(NKN)eϵ+E[M]. (101)

The following optimization problem needs to be solved to minimize the download cost while satisfying α=N+(NKN)eϵ(N1)e2ϵ+(NKN)eϵ+1, from (49):

minE[M]s.t.E1M+1=N+(NKN)eϵ(N1)e2ϵ+(NKN)eϵ+1=α. (102)

Lemma 1. 

The solution to the optimization problem in (102) is given by

E[M]=2uu(u+1)α, (103)

where u=1α for a given value of α, which is specified by the required level of deception d.

The proof of Lemma 1 is given in Appendix A. The minimum download cost for the general case with N databases, K files, and a deception requirement d is obtained by (101) and (103). The corresponding maximum achievable rate is given in (9).

5. Discussion and Conclusions

We introduced the problem of deceptive information retrieval (DIR), in which a user retrieves a file from a set of independent files stored in multiple databases, while revealing fake information about the required file to the databases, which makes the probability of error of the databases’ prediction on the user-required file index high. The proposed scheme achieves rates lower than the PIR capacity when the required level of deception is positive, as it sends dummy queries at distinct time instances to deceive the databases. When the required level of deception is zero, the achievable DIR rate is the same as the PIR capacity.

The probability of error of the databases’ prediction on the user-required file index is calculated at the time of the user’s requirement, as defined in Section 2. In the proposed scheme, the user sends dummy queries at other (future) time instances as well. As the databases are unaware of being deceived, and are unable to distinguish between the times corresponding to real and dummy queries, they make predictions on the user-required file indices every time a query is received. Note that whenever a query of the form Wk is received, the databases’ prediction is going to be θ^=k from Table 14. Although this is an incorrect prediction with high probability at times corresponding to the user’s real requirements, these predictions are correct when Wk is used as a dummy query, as Wk is only sent as a dummy query when the user needs to download file k. However, the databases are only able to obtain these correct predictions at future time instances, after which the user has already downloaded the required file while also deceiving the databases.

The reason for the requirement of the time dimension is also explained as follows. An alternative approach to using the time dimension is to select a subset of databases to send the dummy queries and to send the real queries to the rest of the databases. As explained above, whenever a database receives a query of the form Wk as a dummy query, the database predicts the user-required file correctly. Therefore, this approach leaks information about the required file to a subset of databases, right at the time of the retrieval, while deceiving the rest. Hence, to deceive all databases at the time of retrieval, we exploit the time dimension that is naturally present in information retrieval applications that are time-sensitive.

A potential future direction of this work is an analysis on the time dimension. Note that, in this work, we assume that the databases do not keep track of the previous queries and only store the information corresponding to the current time instance. Therefore, as long as the dummy queries are sent at distinct time instances that are also different from the time of the user’s requirement, the calculations presented in this paper are valid. An extension of basic DIR can be formulated by assuming that the databases keep track of all queries received and their time stamps. This imposes additional constraints on the problem, as the databases now have extra information along the time dimension, which requires the scheme to choose the time instances at which the dummy queries are sent, in such a way that they do not leak any information about the existence of the two types (real and dummy) of queries. Another direction is to incorporate the freshness and age of information into DIR, where the user may trade the age of the required file for a reduced download cost, by making use of the previous dummy downloads present in DIR.

Appendix A. Proof of Lemma 1

The solution to the optimization problem in (102) for the general case with N databases and K files is as follows. The optimization problem in (102), for a required amount of deception d and the corresponding ϵ with α=N+(NKN)eϵ(N1)e2ϵ+(NKN)eϵ+1, is given by

minE[M]=m=0mpms.t.E1m+1=m=01m+1pm=αm=0pm=1
pm0,m{0,1,}. (A1)

We need to determine the optimum PMF of M that minimizes E[M] while satisfying the given condition. The Lagrangian L of this optimization problem is given by

L=m=0mpm+λ1m=01m+1pmα+λ2m=0pm1m=0μmpm. (A2)

Then, the following set of equations need to be solved to find the minimum E[M]:

Lpm=m+λ11m+1+λ2μm=0,m{0,1,} (A3)
m=01m+1pm=α (A4)
m=0pm=1 (A5)
μmpm=0,m{0,1,} (A6)
μm,pm0,m{0,1,}. (A7)

Case 1: Assume that the PMF of M contains at most two non-zero probabilities, i.e., p0,p10 and pi=0, i{2,3,}. Then, the conditions in (A3)–(A7) are simplified as

Lp0=λ1+λ2μ0=0 (A8)
Lp1=12λ1+λ2μ1=1 (A9)
p0+12p1=α (A10)
p0+p1=1 (A11)
μ0p0=0 (A12)
μ1p1=0 (A13)
μ0,μ1,p0,p10. (A14)

From (A10) and (A11), we obtain

p0+12(1p0)=α (A15)

and thus,

p0=2α1,p1=22α, (A16)

which along with (A14) implies that this solution is only valid for 12α1. The corresponding optimum value of E[M] is given by

E[M]=1p0=22α,12α1. (A17)

Case 2: Now consider the case where at most three probabilities of the PMF of M are allowed to be non-zero, i.e., p0,p1,p20 and pi=0, i{3,4,}. The set of conditions in (A3)–(A7) for this case is

Lpm=m+λ11m+1+λ2μm=0,m{0,1,2} (A18)
m=021m+1pm=α (A19)
m=02pm=1 (A20)
μmpm=0,m{0,1,2} (A21)
μm,pm0,m{0,1,2}. (A22)

The set of conditions in (A18)–(A22) can be written in a matrix form as

11100000121010000131001000000001121300000111λ1λ2μ0μ1μ2p0p1p2=012α1. (A23)

Three of the above eight variables, i.e., either μi or pi for each i, are always zero according to (A21). We consider all choices of {μi,pi} pairs such that one element of the pair is equal to zero, and the other one is a positive variable, and solve the system for the non-zero variables. Then we calculate the resulting E[M], along with the corresponding regions of u for which the solutions are applicable. For each region of u, we find the solution to (A23) that results in the minimum E[M]. Based on this process, the optimum values of pi, i{0,1,2}, the corresponding ranges of u, and the minimum values of E[M] are given in Table A1.

Table A1.

Solution to Case 2: Optimum PMF of M, valid ranges of α, and minimum E[M].

Range of α p0 p1 p2 E[M]
13α12 0 6α2 36α 46α
12α1 2α1 22α 0 22α

As an example, consider the calculations corresponding to the case where μ0>0, μ1=μ2=0, which implies p0=0, p1,p2>0. Note that for this case, (A23) simplifies to

11100121000131000000121300011λ1λ2μ0p1p2=012α1. (A24)

The values of p1 and p2, from the solution of the above system, and the corresponding range of α, from (A22), along with the resulting E[M], are given by

p1=6α2,p2=36α,13α12,E[M]=46α. (A25)

Case 3: At most four non-zero elements of the PMF of M are considered in this case, i.e., p0,p1,p2,p30 and pi=0, i{4,5,}. The conditions in (A3)–(A7) can be written in a matrix form as

111000000012101000000131001000001410001000000000011213140000001111λ1λ2μ0μ1μ2μ3p0p1p2p3=0123α1. (A26)

Using the same method described in Case 2, the optimum values of pi, i{0,1,2,3}, corresponding ranges of α, and the resulting minimum E[M] for Case 3 are given in Table A2.

Table A2.

Solution to Case 3: Optimum PMF of M, valid ranges of α and minimum E[M].

Range of α p0 p1 p2 p3 E[M]
14α13 0 0 12α3 412α 612α
13α12 0 6α2 36α 0 46α
12α1 2α1 22α 0 0 22α

Case 4: At most five non-zero elements of the PMF of M are considered in this case, i.e., p0,p1,p2,p3,p40 and pi=0, i{5,6,}. The conditions in (A3)–(A7) can be written in a matrix form as

11100000012101000001310010000141000100015100001000000112131415000011111λ1λ2μ0μ1μ2μ3μ4p0p1p2p3p4=01234α1. (A27)

Using the same method as before, the optimum values of pi, i{0,1,2,3,4}, the corresponding ranges of α, and the resulting minimum E[M] for Case 4 are given in Table A3.

Table A3.

Solution to Case 4: Optimum PMF of M, valid ranges of α, and minimum E[M].

Range of α p0 p1 p2 p3 p4 E[M]
15α14 0 0 0 20α4 520α 820α
14α13 0 0 12α3 412α 0 612α
13α12 0 6α2 36α 0 0 46α
12α1 2α1 22α 0 0 0 22α

Note that the PMF of M and the resulting E[M] are the same for a given α in all cases (see Table A1, Table A2 and Table A3) irrespective of the support of the PMF of M considered. Therefore, we observe from the above cases that, for a given α in the range 1+1α1, E[M] is minimized when the PMF of M is such that

p,p1>0,andpi=0foriZ+{,1}, (A28)

which requires p and p1 to satisfy

p+p1=1 (A29)
E1M+1=p1+1+p11=α. (A30)

Therefore, for a given α in the range 1+1α1, the optimum PMF of M and the resulting minimum E[M] are given by

p=(+1)(1α),p1=((+1)α1),E[M]=2α(+1). (A31)

Author Contributions

Formal analysis, S.V.; Investigation, S.V.; Writing—original draft, S.V.; Writing—review & editing, S.U.; Supervision, S.U.; Project administration, S.U. All authors have read and agreed to the published version of the manuscript.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflicts of interest.

Funding Statement

This research received no external funding.

Footnotes

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

References

  • 1.Chor B., Kushilevitz E., Goldreich O., Sudan M. Private Information Retrieval. J. ACM. 1998;45:965–981. doi: 10.1145/293347.293350. [DOI] [Google Scholar]
  • 2.Sun H., Jafar S.A. The Capacity of Private Information Retrieval. IEEE Trans. Inf. Theory. 2017;63:4075–4088. doi: 10.1109/TIT.2017.2689028. [DOI] [Google Scholar]
  • 3.Tian C., Sun H., Chen J. Capacity-Achieving Private Information Retrieval Codes with Optimal Message Size and Upload Cost. IEEE Trans. Inf. Theory. 2019;65:7613–7627. doi: 10.1109/TIT.2019.2918207. [DOI] [Google Scholar]
  • 4.Banawan K., Ulukus S. The Capacity of Private Information Retrieval from Coded Databases. IEEE Trans. Inf. Theory. 2018;64:1945–1956. doi: 10.1109/TIT.2018.2791994. [DOI] [Google Scholar]
  • 5.Sun H., Jafar S.A. The Capacity of Robust Private Information Retrieval with Colluding Databases. IEEE Trans. Inf. Theory. 2018;64:2361–2370. doi: 10.1109/TIT.2017.2777490. [DOI] [Google Scholar]
  • 6.Kadhe S., Garcia B., Heidarzadeh A., El Rouayheb S., Sprintson A. Private Information Retrieval With Side Information. IEEE Trans. Inf. Theory. 2020;66:2032–2043. doi: 10.1109/TIT.2019.2948845. [DOI] [Google Scholar]
  • 7.Li S., Gastpar M. Single-server Multi-message Private Information Retrieval with Side Information: The General Cases; Proceedings of the IEEE ISIT; Los Angeles, CA, USA. 21–26 June 2020. [Google Scholar]
  • 8.Yang H., Shin W., Lee J. Private information retrieval for secure distributed storage systems. IEEE Trans. Inf. Forensics Secur. 2018;13:2953–2964. doi: 10.1109/TIFS.2018.2833050. [DOI] [Google Scholar]
  • 9.Jia Z., Jafar S.A. X-Secure T-Private Information Retrieval from MDS Coded Storage with Byzantine and Unresponsive Servers. IEEE Trans. Inf. Theory. 2020;66:7427–7438. doi: 10.1109/TIT.2020.3013152. [DOI] [Google Scholar]
  • 10.Banawan K., Ulukus S. Multi-Message Private Information Retrieval: Capacity Results and Near-Optimal Schemes. IEEE Trans. Inf. Theory. 2018;64:6842–6862. doi: 10.1109/TIT.2018.2828310. [DOI] [Google Scholar]
  • 11.Wang Q., Sun H., Skoglund M. The Capacity of Private Information Retrieval with Eavesdroppers. IEEE Trans. Inf. Theory. 2019;65:3198–3214. doi: 10.1109/TIT.2018.2884891. [DOI] [Google Scholar]
  • 12.Kumar S., Lin H.-Y., Rosnes E., Amat A.G.i. Achieving Maximum Distance Separable Private Information Retrieval Capacity with Linear Codes. IEEE Trans. Inf. Theory. 2019;65:4243–4273. doi: 10.1109/TIT.2019.2900313. [DOI] [Google Scholar]
  • 13.Sun H., Jafar S.A. The Capacity of Symmetric Private Information Retrieval. IEEE Trans. Inf. Theory. 2019;65:322–329. doi: 10.1109/TIT.2018.2848977. [DOI] [Google Scholar]
  • 14.Woolsey N., Chen R., Ji M. Uncoded Placement with Linear Sub-Messages for Private Information Retrieval from Storage Constrained Databases. IEEE Trans. Commun. 2020;68:6039–6053. doi: 10.1109/TCOMM.2020.3010988. [DOI] [Google Scholar]
  • 15.Fanti G., Ramchandran K. Efficient Private Information Retrieval over Unsynchronized Databases. IEEE J. Sel. Top. Signal Process. 2015;9:1229–1239. doi: 10.1109/JSTSP.2015.2432740. [DOI] [Google Scholar]
  • 16.Samy I., Attia M., Tandon R., Lazos L. Asymmetric Leaky Private Information Retrieval. IEEE Trans. Inf. Theory. 2021;67:5352–5369. doi: 10.1109/TIT.2021.3085363. [DOI] [Google Scholar]
  • 17.Guo T., Zhou R., Tian C. On the Information Leakage in Private Information Retrieval Systems. IEEE Trans. Inf. Forensics Secur. 2020;15:2999–3012. doi: 10.1109/TIFS.2020.2981282. [DOI] [Google Scholar]
  • 18.Liebowitz D., Nepal S., Moore K., Christopher C., Kanhere S., Nguyen D., Timmer R., Longland M., Rathakumar K. Deception for Cyber Defence: Challenges and Opportunities; Proceedings of the TPS-ISA; Atlanta, GA, USA. 13–15 December 2021. [Google Scholar]
  • 19.Yarali A., Sahawneh F. Deception: Technologies and Strategy for Cybersecurity; Proceedings of the SmartCloud; Tokyo, Japan. 10–12 December 2019. [Google Scholar]
  • 20.Faveri C., Moreira A. Designing Adaptive Deception Strategies; Proceedings of the QRS-C; Vienna, Austria. 1–3 August 2016. [Google Scholar]
  • 21.Tounsi W. Cyber Deception, the Ultimate Piece of a Defensive Strategy—Proof of Concept; Proceedings of the CSNet; Rio de Janeiro, Brazil. 24–26 October 2022. [Google Scholar]
  • 22.Sarr A., Anwar A., Kamhoua C., Leslie N., Acosta J. Software Diversity for Cyber Deception; Proceedings of the IEEE Globecom; Taipei, Taiwan. 7–11 December 2020. [Google Scholar]
  • 23.Samy I., Tandon R., Lazos L. On the Capacity of Leaky Private Information Retrieval; Proceedings of the IEEE ISIT; Paris, France. 7–12 July 2019. [Google Scholar]
  • 24.Vithana S., Banawan K., Ulukus S. Semantic Private Information Retrieval. IEEE Trans. Inf. Theory. 2022;68:2635–2652. doi: 10.1109/TIT.2021.3136583. [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.


Articles from Entropy are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES