Index Coding & Caching in Wireless Networks. Salim El Rouayheb. ECE IIT, Chicago

Size: px
Start display at page:

Download "Index Coding & Caching in Wireless Networks. Salim El Rouayheb. ECE IIT, Chicago"

Transcription

1 Index Coding & Caching in Wireless Networks Salim El Rouayheb ECE IIT, Chicago

2 Big Data vs. Wireless Exabytes per month [Cisco]

3 Meanwhile, Storage is Getting Cheaper Storage cost per GB (USD)

4 Storage = Caching Index coding: [Birk & Kol 98] + Coded Caching: [Maddah-Ali & Niesen 13] + Femto-caching: [Golrezai et al. 12].... Content is cached (stored) on mobile devices during off-peak hours

5 Index Distributed Coding Storage Example Wants: X 1 Has: X 2 X 3 t 1 Transmission # Index code 1 Index code2 t 4 t 2 1 X 1 X 1 +X 2 2 X 2 X 3 3 X 3 X 4 Wants: X 4 Has: X 1 X 1 X 2 X 3 X 4 t 3 Wants: X 2 Has: X 1 X 3 Wants: X 3 Has: X 2 X 4 4 X 4 L=4" Min transmission rate? " Optimal schemes?" Content of the cache is given Birk & Kol, Informed-source coding-on-demand (ISCOD) over broadcast channels, INFOCOM 98 L=3" Cached data independent of a user s preferences still help

6 Talk Roadmap Graph Theory & Index Coding Rank Minimization & Index Coding Network Coding & Index Coding Privacy Problems

7 Index Coding & Coloring 1 2 X 1 +X X X 4 Side info graph G d Clique cover of G = Chromatic nbr of Ḡ X 1 +X 2 +X 3 +X G 5 X 5 Ḡ 5

8 Index Coding & Graph Coloring 1 2 X 1 +X user 1 caches X 3 3 X X 4 L* min min length of linear index code Finding L* min is NP hard by [R., Sprintson, Chaudhry ITW 07] 4 Clique cover of G= Side info graph G d Chromatic nbr of Ḡ Independ (G) apple c(g) apple L ence nbr min apple d f d (Ḡ) apple (Ḡ) Shannon capacity [Haemers 79 ] Fractional Chromatic nbr [Blasiak, Kleinberg, Lubetzky 11 ] More bounds [Dimakis et al.] [Arbobjalfoei & Kim], [Mazumdar et al.] etc

9 Index Coding on Erdős-Rényi Graphs Independence nbr (G) apple L min apple (Ḡ) When n!1, we have with prob 1 log n apple L min apple n log n G(n,p) Can improve the lower bound [Haviv & Langberg Index Coding on random graphs, ISIT 12 ] c p n apple L min apple Chromatic nbr n log n Recent results closes the gap L min = (n/ log n) [Golovnev, Regev & Weinstein, The Min Rank of Random graphs, Arxiv 16 ]

10 Talk Roadmap Graph Theory & Index Coding Rank Minimization & Index Coding Network Coding & Index Coding Privacy Problems

11 Index Coding & Rank Minimization X 1 X 2 X 3 X 4 X 1 t * 10 * 0 X 2 X 1 +X 2 X 1 +X 2 +X 3 X 3 X 3 t 2 t * 1 * * 1 10 * X 4 X 1 +X 4 X 4 t 4 10 * Linear case: L min =minrk(m) Matrix M [Bar-Yossef et al. '06] Min rank introduced by Haemers in 79 to upper bound the Shannon graph capacity Min rank can be a tighter bound on Shannon capacity then Lovász Theta function.

12 Use Matrix Completion Methods to Construct Index Codes Minimizing nuclear norm [Recht & Candes 09] does not work here because the index coding matrices have a special structure. Try other rank minimization methods [Fazel et al. 04] C D Two problems: 1) Regions not convex 2) Optimization over the reals Index coding via AP Theorem: [Alternating Projections (AP)] If C and D are convex, then an alternating projection sequence between these 2 regions converges to a point in their intersection.

13 Alternating Projection on Random Undirected Graphs [Huang & R. Index Coding via Rank minimization ITW 15] Caching prob. p Up to 13% savings over Greedy coloring. No theoretical guarantees. Recent work on min rank over finite field [Sauderson, Fazel, Hassibi ISIT 16] Index coding via LP [Blasiak et al. 10], via SDP [Chlamtac et al 14]

14 Performance with Increasing Number of Users

15

16 Talk Roadmap Graph Theory & Index Coding Rank Minimization & Index Coding Network Coding & Index Coding Privacy Problems

17 Equivalence to Network Coding L Terminals: t 4 t 1 t 2 t 3 Wants: X 4 X 1 X 2 X 3 An index code of length L that satisfies all the users A network code that satisfies all the terminals

18 From Network to Index Coding Index coding is equivalent to the general network coding. If you can solve index coding efficiently you can solve any general network coding problem efficiently. How to map the codes? X 1, X 2,, X r How many? Rates? Wants:??? Has:??? Theorem: [R,Sprintson, Georghiades 08] [Effros,R,Langberg ISIT 13] For any network coding problem, one can construct an index coding problem and an integer L such that given any linear network code, one can efficiently construct a linear index code of length L, and vice versa. (same block length, same error probability).

19 Network Code è Index Code The linear case first X 1 X 2 X 1 X 2 X 1 +X 2 X 1 X 2 X X 1 +X 1 +X 2 2 Butterfly network Y e1 +X 1 Y e2 +X 1 Y e3 +X 2 Y e4 +X 2 Y e5 +X 1 +X 2 Y e6 +X 1 +X 2 Y e7 +X 1 +X 2 X 1, X 2 Y e1, Y e2,, Y e7 H(Y ei )=c(e i )=1 Equivalent index code All terminals in the index coding problem can decode Any linear network code gives an index code of length L=7

20 Implications on Index Coding Linear index codes are not optimal Vector linear codes outperform scalar linear No linear network code but a nonlinear code over alphabet of size 4 [zeger et al. 06] Only vector linear codes exist when block length is even.

21 Connections to many problems Interference management: [Jafar et al. 12] Distributed storage & caching: [Mazumdar 14], [Shanmugam et al. 14 Matroid representations: [Rouayheb et al. 09] Graph coloring: [Fragouli, Soljanin, Shokrollahi 04] [Alon et al. 08], [Shanmugam & Dimakis 13] LP bounds: [Blasiak, Kleinberg, Lubetzky 11 ] Coded caching [Maddah-Ali & Niesen 13] +

22 Variations on Index Coding 1. Data Exchange Problem [R., Sprintson, Sadeghi ITW 10] [Milosavlevijc, Pawar, R., Ramchandran, 13] [Courtade et al. 13] a No Base station (D2D). Users wants missed parts 2. Pliable index coding [Fragouli et al 15] b User 1 File: User 2 Like index coding but users want anything they don t have User 3 3. Coded Caching [Maddah-Ali & Niesen 14] Cached content is not fixed and can be designed Best paper, lots of follow up work

23 Talk Roadmap Graph Theory & Index Coding Rank Minimization & Index Coding Network Coding & Index Coding Privacy Problems

24 Caching Distributed for Private Storage Information Retrieval (PIR) PIR: user wants to hide which file it wants [chor et al 95] One server: User need to download all the data Classical PIR: data replicated on many servers Recent work: coded PIR [Jafar et al.], [Vardy et al.], [Rouayheb et al.], [Ulukus et al], [Hollanti et al.] Caching for PIR: user does not reveal cached data X 1 X 2 X M Server user Wants: X 1 Kadhe, Garcia, Heidarzadeh, R., Sprintson, PIR with Side Information, Allerton 17

25 SECURE COOPERATIVE COMPUTING IN IOT Collaboration with Hulya Seferoglu UIC Local computations on untrusted workers Homomorphic Encryption very costly New codes for security Bitar, R., Staircase Codes for Secret Sharing with Optimal Communication Overhead, Trans. on info th., R. Bitar P. Parag, R., Minimizing Latency for Secure Distributed Computing, submitted to ISIT 17

26 Acknowledgment Collaborators My students: Rawad Bitar, Razan Tajeddine, Peiwen Tian Camilla Hollanti (Aalto University, Finland) Olgica Milenkovic (UIUC) Hulya Seferoglu, (UIC) Parimal Parag (IISC, India) Funding agencies: NSF: CCF NSF: CCF ARL: W911NF

27 QUESTIONS?

28 Network Code è Index Code The linear case first X 1 X 2 X 1 X 2 X 1 +X 2 X 1 X 2 X X 1 +X 1 +X 2 2 Butterfly network Y e1 +X 1 Y e2 +X 1 Y e3 +X 2 Y e4 +X 2 Y e5 +X 1 +X 2 Y e6 +X 1 +X 2 Y e7 +X 1 +X 2 X 1, X 2 Y e1, Y e2,, Y e7 H(Y ei )=c(e i )=1 Equivalent index code All terminals in the index coding problem can decode Any linear network code gives an index code of length L=7

29 Index Code è Network Code Given a linear index code Y e1 +X 1 Y e2 +X 1 Y e3 +X 2 Y e4 +X 2 Y e5 +X 1 +X 2 Y e6 +X 1 +X 2 Y e7 +X 1 +X 2 Can always diagonalize Y e1 +Y e2 Y e2 +X 1 Y e3 +X 2 Y e4 +X 2 Y e5 +Y e4 +X 1 Y e6 +X 1 +X 2 Y e6 +Y e7 Butterfly network Any linear index code of length L=7 can be mapped to a linear network code Works for scalar linear and vector linear

30 Non-Linear Network Code è Index Code Y e1 + f e1 (X 1,X 2 ) Y e2 + f e2 (X 1,X 2 ) Y e3 + f e3 (X 1,X 2 ) Y e4 + f e4 (X 1,X 2 ) Y e5 + f e5 (X 1,X 2 ) Y e6 + f e6 (X 1,X 2 ) Y e7 + f e7 (X 1,X 2 ) Butterfly network Equivalent index code f ei (X 1,X 2 ) : message on edge e i

31 Diagonalization May Not Work for Non-Linear Butterfly network B 0 1 = g 0 1(Y e1, X) B 0 2 = g 0 2(Y e2, X) B 0 3 = g 0 3(Y e3, X) B 0 4 = g 0 4(Y e4, X) B 0 5 = g 0 5(Y e5, X) B 0 6 = g 0 6(Y e6, X) B 0 7 = g 0 7(Y e7, X) If we can we diagonalize? Given a nonlinear index code B 1 = g 1 (Ȳe, X) B 2 = g 2 (Ȳe, X) B 3 = g 3 (Ȳe, X) B 4 = g 4 (Ȳe, X) B 5 = g 5 (Ȳe, X) B 6 = g 6 (Ȳe, X) B 7 = g 7 (Ȳe, X)

32 Non-linear Index Code è Network Code Broadcast message Decoding function D Ue2 (0,X 1 ) D Ue3 (0,X 2 ) D Ue1 (0,X 1 ) D Ue4 (0,X 2 ) D Ue5 (0,Y e2,y e3 ) X1 =D Ut1 (B,Y e4,y e7 ) Y e4 = D Ue4 (B,X 2 ) Y e7 = D Ue7 (B,Y e5 ) D Ue7 (0,Y e5 ) D Ue6 (0,Y e5 ) Fix a value for B, say B=0 Destinations can decode with no errors: Recall that B=f(X 1,X 2, Y e1,,y e7 ) For a fixed B and given values of X 1 and X 2, there is a unique possible vector (Y e1,,y e7 ) Otherwise, U* cannot decode correctly

33 Dealing with Errors Consider an index code where decoding errors only happen when the broadcast message B=0 ε: Prob of error in the index code =1/2 c =1/2 7 = Prob of error in the network code =1 (bad). Claim: There exists σ, such that for B=σ, in the previous construction, the network code will have a prob of error at most ε (ε=error prob of the index code). Intuition: if for every value of B, the resulting network code will have a prob of error>ε, this implies that the prob of error in the index code >ε. A contradiction. B X=(X 1,X 2 ) Ye= Σ X =2 2 D U (B,X 1,X 2 ) : decoding error Each corresponds to a different good value of (X,Ye) Σ B =2 c Total # of <(1-ε) Σ B. Σ X But Σ B = Σ Ye è Total # of good values<(1-ε) Σ Ye. Σ X contradiction

34 Capacity Regions R X2 R B R B =7 1 P P H R N 1 R X1 :Capacity region of a network R X1 1 1 R X2 R I :Capacity region of the equivalent index code If there is a code that achieves P exactly, then P is in R I \ H, and vice versa. What if a sequence of points (not necessarily in H) converges to P. Does this mean that P is in R N? If true this will solve a long-standing open problem: Is zero-error capacity= ε-error capacity of networks? True for index coding problems [Langberg, Effros 11]

35 The Case of Co-located Sources R X2 R B R B =7 1 P P H R N 1 R X1 :Capacity region of a network 1 1 R X2 R I :Capacity region of the equivalent index code Theorem: For any network N with co-located sources one can efficiently construct an index coding problem I and an integer L such that R is in the capacity region of N iff R is in the capacity region of with broadcast length L. I

Index Coding Algorithms for Constructing Network Codes. Salim El Rouayheb. Illinois Institute of Technology, Chicago

Index Coding Algorithms for Constructing Network Codes. Salim El Rouayheb. Illinois Institute of Technology, Chicago Index Coding Algorithms for Constructing Network Codes Salim El Rouayheb Illinois Institute of Technology, Chicago Matlab Code with GUI for Constructing Linear Network Codes Matlab outputs network code

More information

An Equivalence between Network Coding and Index Coding

An Equivalence between Network Coding and Index Coding An Equivalence between Network Coding and Index Coding Michelle Effros, Fellow, IEEE, Salim El Rouayheb, Member, IEEE, Michael Langberg, Member, IEEE 1 Abstract We show that the network coding and index

More information

Index Coding via Random Coding

Index Coding via Random Coding 204 Iran Workshop on Communication and Information Theory (IWCIT) Index Coding via Random Coding Fatemeh Arbabjolfaei,BerndBandemer,Young-HanKim Department of Electrical and Computer Engineering University

More information

Local Graph Coloring and Index Coding

Local Graph Coloring and Index Coding 1 Local Graph Coloring and Index Coding Karthikeyan Shanmugam, Alexandros G. Dimakis and Michael Langberg Department of Electrical and Computer Engineering University of Texas at Austin Austin, TX 78712-1684

More information

Broadcasting With Side Information

Broadcasting With Side Information Department of Electrical and Computer Engineering Texas A&M Noga Alon, Avinatan Hasidim, Eyal Lubetzky, Uri Stav, Amit Weinstein, FOCS2008 Outline I shall avoid rigorous math and terminologies and be more

More information

STAIRCASE CODES FOR FAST AND SECURE DISTRIBUTED COMPUTING

STAIRCASE CODES FOR FAST AND SECURE DISTRIBUTED COMPUTING SIP Seminar of INSPIRE Lab, Rutgers New Jersey STAIRCASE CODES FOR FAST AND SECURE DISTRIBUTED COMPUTING Rawad Bitar Illinois Ins/tute of Technology Rutgers University Collaborators Parimal Parag and Salim

More information

Tutorial on Coded Private Information Retrieval

Tutorial on Coded Private Information Retrieval Tutorial on Coded Private Information Retrieval Camilla Hollanti Aalto University, Finland 5th ICMCTA, Vihula, August 2017 Based on joint work with Salim El Rouayheb, Ragnar Freij-Hollanti, Oliver Gnilke,

More information

Index coding with side information

Index coding with side information Index coding with side information Ehsan Ebrahimi Targhi University of Tartu Abstract. The Index Coding problem has attracted a considerable amount of attention in the recent years. The problem is motivated

More information

Optimal Index Codes via a Duality between Index Coding and Network Coding

Optimal Index Codes via a Duality between Index Coding and Network Coding Optimal Index Codes via a Duality between Index Coding and Network Coding Ashok Choudhary, Vamsi Krishna Gummadi, Prasad Krishnan Signal Processing and Communications Research Centre, International Institute

More information

Private Information Retrieval from MDS Coded Data in Distributed Storage Systems

Private Information Retrieval from MDS Coded Data in Distributed Storage Systems Private Information Retrieval from MDS Coded Data in Distributed Storage Systems Joint work with Razane Tajeddine Salim El Rouayheb ECE Department Illinois Institute of Technology Motivation 1 Secure Multiparty

More information

On linear index coding from graph homomorphism perspective

On linear index coding from graph homomorphism perspective On linear index coding from graph homomorphism perspective Javad B. Ebrahimi, Mahdi Jafari Siavoshani Institute of Network Coding, Chinese University of Hong Kong, Hong Kong Computer Engineering Department,

More information

Optimal Index Codes with Near-Extreme Rates

Optimal Index Codes with Near-Extreme Rates 0 IEEE International Symposium on Information Theory Proceedings Optimal Index Codes with Near-Extreme Rates Son Hoang Dau Division of Mathematical Sciences School of Phys. and Math. Sciences Nanyang Technological

More information

Index Coding. Trivandrum School on Communication, Coding and Networking Prasad Krishnan

Index Coding. Trivandrum School on Communication, Coding and Networking Prasad Krishnan Index Coding Trivandrum School on Communication, Coding and Networking 2017 Prasad Krishnan Signal Processing and Communications Research Centre, International Institute of Information Technology, Hyderabad

More information

Private Information Retrieval from Coded Databases

Private Information Retrieval from Coded Databases Private Information Retrieval from Coded Databases arim Banawan Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 20742 kbanawan@umdedu ulukus@umdedu

More information

Index Coding With Erroneous Side Information

Index Coding With Erroneous Side Information Index Coding With Erroneous Side Information Jae-Won Kim and Jong-Seon No, Fellow, IEEE 1 Abstract arxiv:1703.09361v1 [cs.it] 28 Mar 2017 In this paper, new index coding problems are studied, where each

More information

On the Index Coding Problem and its Relation to Network Coding and Matroid Theory

On the Index Coding Problem and its Relation to Network Coding and Matroid Theory 1 On the Index Coding Problem and its Relation to Network Coding and Matroid Theory Salim Y. El Rouayheb, Alex Sprintson, and Costas N. Georghiades Department of Electrical and Computer Engineering Texas

More information

arxiv: v1 [cs.it] 23 Jan 2019

arxiv: v1 [cs.it] 23 Jan 2019 Single-Server Single-Message Online Private Information Retrieval with Side Information Fatemeh azemi, Esmaeil arimi, Anoosheh Heidarzadeh, and Alex Sprintson arxiv:90.07748v [cs.it] 3 Jan 09 Abstract

More information

On the Hardness of Approximating the Network Coding Capacity

On the Hardness of Approximating the Network Coding Capacity On the Hardness of Approximating the Network Coding Capacity Michael Langberg, Member, IEEE, and Alex Sprintson, Member, IEEE. 1 Abstract This work addresses the computational complexity of achieving the

More information

On the Capacity Region for Secure Index Coding

On the Capacity Region for Secure Index Coding On the Capacity Region for Secure Index Coding Yuxin Liu, Badri N. Vellambi, Young-Han Kim, and Parastoo Sadeghi Research School of Engineering, Australian National University, {yuxin.liu, parastoo.sadeghi}@anu.edu.au

More information

A Novel Index Coding Scheme and its Application to Coded Caching

A Novel Index Coding Scheme and its Application to Coded Caching A ovel Index Coding Scheme and its Application to Coded Caching ai Wan Laboratoire des Signaux et Systèmes L2S CentraleSupèlec-CRS-Universitè Paris-Sud 91192 Gif-sur-Yvette, France Email: kai.wan@u-psud.fr

More information

Optimal Scalar Linear Index Codes for Symmetric and Neighboring Side-information Problems

Optimal Scalar Linear Index Codes for Symmetric and Neighboring Side-information Problems Optimal Scalar Linear Index Codes for Symmetric and Neighboring Side-information Problems Mahesh Babu Vaddi and B Sundar Rajan Department of Electrical Communication Engineering, Indian Institute of Science,

More information

Non-linear index coding outperforming the linear optimum

Non-linear index coding outperforming the linear optimum Non-linear index coding outperforming the linear optimum Eyal Lubetzky Uri Stav Abstract The following source coding problem was introduced by Birk and Kol: a sender holds a word x {0, 1} n, and wishes

More information

Simplified Composite Coding for Index Coding

Simplified Composite Coding for Index Coding Simplified Composite Coding for Index Coding Yucheng Liu, Parastoo Sadeghi Research School of Engineering Australian National University {yucheng.liu, parastoo.sadeghi}@anu.edu.au Fatemeh Arbabjolfaei,

More information

On Secure Index Coding with Side Information

On Secure Index Coding with Side Information On Secure Index Coding with Side Information Son Hoang Dau Division of Mathematical Sciences School of Phys. and Math. Sciences Nanyang Technological University 21 Nanyang Link, Singapore 637371 Email:

More information

Weakly Secure Data Exchange with Generalized Reed Solomon Codes

Weakly Secure Data Exchange with Generalized Reed Solomon Codes Weakly Secure Data Exchange with Generalized Reed Solomon Codes Muxi Yan, Alex Sprintson, and Igor Zelenko Department of Electrical and Computer Engineering, Texas A&M University Department of Mathematics,

More information

Lexicographic Products and the Power of Non-Linear Network Coding

Lexicographic Products and the Power of Non-Linear Network Coding Lexicographic Products and the Power of Non-Linear Network Coding Anna Blasiak Dept. of Computer Science Cornell University. ablasiak@cs.cornell.edu Robert Kleinberg Dept. of Computer Science Cornell University.

More information

Error Correcting Index Codes and Matroids

Error Correcting Index Codes and Matroids Error Correcting Index Codes and Matroids Anoop Thomas and B Sundar Rajan Dept of ECE, IISc, Bangalore 5612, India, Email: {anoopt,bsrajan}@eceiiscernetin arxiv:15156v1 [csit 21 Jan 215 Abstract The connection

More information

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu

More information

The Minrank of Random Graphs

The Minrank of Random Graphs The Minrank of Random Graphs Alexander Golovnev Oded Regev Omri Weinstein Abstract The minrank of a directed graph G is the minimum rank of a matrix M that can be obtained from the adjacency matrix of

More information

Reverse Edge Cut-Set Bounds for Secure Network Coding

Reverse Edge Cut-Set Bounds for Secure Network Coding Reverse Edge Cut-Set Bounds for Secure Network Coding Wentao Huang and Tracey Ho California Institute of Technology Michael Langberg University at Buffalo, SUNY Joerg Kliewer New Jersey Institute of Technology

More information

Semidefinite and Second Order Cone Programming Seminar Fall 2001 Lecture 5

Semidefinite and Second Order Cone Programming Seminar Fall 2001 Lecture 5 Semidefinite and Second Order Cone Programming Seminar Fall 2001 Lecture 5 Instructor: Farid Alizadeh Scribe: Anton Riabov 10/08/2001 1 Overview We continue studying the maximum eigenvalue SDP, and generalize

More information

On the Relation Between the Index Coding and the Network Coding Problems

On the Relation Between the Index Coding and the Network Coding Problems On the Relation Between the Index Coding and the Network Coding Problems Salim El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University,

More information

A Polynomial-Time Algorithm for Pliable Index Coding

A Polynomial-Time Algorithm for Pliable Index Coding 1 A Polynomial-Time Algorithm for Pliable Index Coding Linqi Song and Christina Fragouli arxiv:1610.06845v [cs.it] 9 Aug 017 Abstract In pliable index coding, we consider a server with m messages and n

More information

The Capacity of Private Information Retrieval from Coded Databases

The Capacity of Private Information Retrieval from Coded Databases The Capacity of Private Information Retrieval from Coded Databases Karim Banawan Sennur Ulukus arxiv:6090838v [csit] 6 Sep 06 Department of Electrical and Computer Engineering University of Maryland, College

More information

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi, Nihar B Shah, and P Vijay Kumar, Fellow, IEEE Abstract Regenerating codes

More information

Security in Locally Repairable Storage

Security in Locally Repairable Storage 1 Security in Locally Repairable Storage Abhishek Agarwal and Arya Mazumdar Abstract In this paper we extend the notion of locally repairable codes to secret sharing schemes. The main problem we consider

More information

LATTICES AND CODES ISHAY HAVIV TEL AVIV UNIVERSITY THE RAYMOND AND BEVERLY SACKLER FACULTY OF EXACT SCIENCES THE BLAVATNIK SCHOOL OF COMPUTER SCIENCE

LATTICES AND CODES ISHAY HAVIV TEL AVIV UNIVERSITY THE RAYMOND AND BEVERLY SACKLER FACULTY OF EXACT SCIENCES THE BLAVATNIK SCHOOL OF COMPUTER SCIENCE TEL AVIV UNIVERSITY THE RAYMOND AND BEVERLY SACKLER FACULTY OF EXACT SCIENCES THE BLAVATNIK SCHOOL OF COMPUTER SCIENCE LATTICES AND CODES THESIS SUBMITTED FOR THE DEGREE OF DOCTOR OF PHILOSOPHY BY ISHAY

More information

On the Existence of Optimal Exact-Repair MDS Codes for Distributed Storage

On the Existence of Optimal Exact-Repair MDS Codes for Distributed Storage On the Existence of Optimal Exact-Repair MDS Codes for Distributed Storage Changho Suh Kannan Ramchandran Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report

More information

Distributed storage systems from combinatorial designs

Distributed storage systems from combinatorial designs Distributed storage systems from combinatorial designs Aditya Ramamoorthy November 20, 2014 Department of Electrical and Computer Engineering, Iowa State University, Joint work with Oktay Olmez (Ankara

More information

Fractional Repetition Codes For Repair In Distributed Storage Systems

Fractional Repetition Codes For Repair In Distributed Storage Systems Fractional Repetition Codes For Repair In Distributed Storage Systems 1 Salim El Rouayheb, Kannan Ramchandran Dept. of Electrical Engineering and Computer Sciences University of California, Berkeley {salim,

More information

Private Information Retrieval from Coded Databases with Colluding Servers

Private Information Retrieval from Coded Databases with Colluding Servers SIAM J APPL ALGEBRA GEOMETRY Vol 1, pp 647 664 c 2017 Society for Industrial and Applied Mathematics Private Information Retrieval from Coded Databases with Colluding Servers Ragnar Freij-Hollanti, Oliver

More information

The two-unicast problem

The two-unicast problem The two-unicast problem Sudeep Kamath, Venkat Anantharam, David Tse, Chih-Chun Wang ECE Department, Princeton University, sukamath@princeton.edu EECS Department, University of California, Berkeley, ananth@eecs.berkeley.edu

More information

Latency analysis for Distributed Storage

Latency analysis for Distributed Storage Latency analysis for Distributed Storage Parimal Parag Archana Bura Jean-François Chamberland Electrical Communication Engineering Indian Institute of Science Electrical and Computer Engineering Texas

More information

arxiv: v2 [cs.it] 13 Jul 2011

arxiv: v2 [cs.it] 13 Jul 2011 Index coding via linear programming Anna Blasiak Robert Kleinberg Eyal Lubetzky arxiv:1004.1379v2 [cs.it] 13 Jul 2011 Abstract Index Coding has received considerable attention recently motivated in part

More information

On the Equivalency of Reliability and Security Metrics for Wireline Networks

On the Equivalency of Reliability and Security Metrics for Wireline Networks On the Equivalency of Reliability and Security Metrics for Wireline Networks Mohammad Mahdi Mojahedian, Amin Gohari and Mohammad Reza Aref arxiv:1609.04586v1 [cs.it] 15 Sep 2016 Information Systems and

More information

Coded Caching with Low Subpacketization Levels

Coded Caching with Low Subpacketization Levels Electrical and Computer Engineering Conference Papers, Posters and Presentations Electrical and Computer Engineering 06 Coded Caching with Low Subpacetization Levels Li Tang Iowa State University, litang@iastateedu

More information

Coded Caching for Files with Distinct File Sizes

Coded Caching for Files with Distinct File Sizes Coded Caching for Files with Distinct File Sizes Jinbei Zhang, Xiaojun Lin, Chih-Chun Wang, Xinbing Wang Shanghai Jiao Tong University Purdue University The Importance of Caching Server cache cache cache

More information

arxiv: v2 [cs.it] 23 Aug 2018

arxiv: v2 [cs.it] 23 Aug 2018 Storage Capacity as an Information-Theoretic Vertex Cover and the Index Coding Rate Arya Mazumdar Andrew McGregor Sofya Vorotnikova arxiv:1706.09197v2 [cs.it] 23 Aug 2018 Abstract Motivated by applications

More information

An Ins t Ins an t t an Primer

An Ins t Ins an t t an Primer An Instant Primer Links from Course Web Page Network Coding: An Instant Primer Fragouli, Boudec, and Widmer. Network Coding an Introduction Koetter and Medard On Randomized Network Coding Ho, Medard, Shi,

More information

2014 IEEE International Symposium on Information Theory. Two-unicast is hard. David N.C. Tse

2014 IEEE International Symposium on Information Theory. Two-unicast is hard. David N.C. Tse Two-unicast is hard Sudeep Kamath ECE Department, University of California, San Diego, CA, USA sukamath@ucsd.edu David N.C. Tse EECS Department, University of California, Berkeley, CA, USA dtse@eecs.berkeley.edu

More information

On the Simulatability Condition in Key Generation Over a Non-authenticated Public Channel

On the Simulatability Condition in Key Generation Over a Non-authenticated Public Channel On the Simulatability Condition in Key Generation Over a Non-authenticated Public Channel Wenwen Tu and Lifeng Lai Department of Electrical and Computer Engineering Worcester Polytechnic Institute Worcester,

More information

IN THIS paper, we consider a cooperative data exchange

IN THIS paper, we consider a cooperative data exchange IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 62, NO. 7, JULY 2016 3785 Coded Cooperative Data Exchange for a Secret Key Thomas A. Courtade, Member, IEEE, and Thomas R. Halford, Member, IEEE Abstract We

More information

Secure RAID Schemes from EVENODD and STAR Codes

Secure RAID Schemes from EVENODD and STAR Codes Secure RAID Schemes from EVENODD and STAR Codes Wentao Huang and Jehoshua Bruck California Institute of Technology, Pasadena, USA {whuang,bruck}@caltechedu Abstract We study secure RAID, ie, low-complexity

More information

Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University

Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Joint work with Jinbei Zhang (SJTU), Chih-Chun Wang (Purdue) and Xinbing Wang (SJTU)

More information

Source Coding and Function Computation: Optimal Rate in Zero-Error and Vanishing Zero-Error Regime

Source Coding and Function Computation: Optimal Rate in Zero-Error and Vanishing Zero-Error Regime Source Coding and Function Computation: Optimal Rate in Zero-Error and Vanishing Zero-Error Regime Solmaz Torabi Dept. of Electrical and Computer Engineering Drexel University st669@drexel.edu Advisor:

More information

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer

More information

Coded Caching under Arbitrary Popularity Distributions

Coded Caching under Arbitrary Popularity Distributions Coded Caching under Arbitrary Popularity Distributions Jinbei Zhang, Xiaojun Lin, Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University, China School of Electrical and Computer Engineering,

More information

Weakly Secure Regenerating Codes for Distributed Storage

Weakly Secure Regenerating Codes for Distributed Storage Weakly Secure Regenerating Codes for Distributed Storage Swanand Kadhe and Alex Sprintson 1 arxiv:1405.2894v1 [cs.it] 12 May 2014 Abstract We consider the problem of secure distributed data storage under

More information

Coding with Constraints: Minimum Distance. Bounds and Systematic Constructions

Coding with Constraints: Minimum Distance. Bounds and Systematic Constructions Coding with Constraints: Minimum Distance 1 Bounds and Systematic Constructions Wael Halbawi, Matthew Thill & Babak Hassibi Department of Electrical Engineering arxiv:1501.07556v2 [cs.it] 19 Feb 2015 California

More information

Analyzing Large Communication Networks

Analyzing Large Communication Networks Analyzing Large Communication Networks Shirin Jalali joint work with Michelle Effros and Tracey Ho Dec. 2015 1 The gap Fundamental questions: i. What is the best achievable performance? ii. How to communicate

More information

Distributed Reed-Solomon Codes

Distributed Reed-Solomon Codes Distributed Reed-Solomon Codes Farzad Parvaresh f.parvaresh@eng.ui.ac.ir University of Isfahan Institute for Network Coding CUHK, Hong Kong August 216 Research interests List-decoding of algebraic codes

More information

Regenerating Codes and Locally Recoverable. Codes for Distributed Storage Systems

Regenerating Codes and Locally Recoverable. Codes for Distributed Storage Systems Regenerating Codes and Locally Recoverable 1 Codes for Distributed Storage Systems Yongjune Kim and Yaoqing Yang Abstract We survey the recent results on applying error control coding to distributed storage

More information

Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient

Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Viveck R Cadambe, Syed A Jafar, Hamed Maleki Electrical Engineering and

More information

Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes

Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes Ankit Singh Rawat CS Department Carnegie Mellon University Pittsburgh, PA 523 Email: asrawat@andrewcmuedu O Ozan Koyluoglu Department

More information

Dynamic Power Allocation and Routing for Time Varying Wireless Networks

Dynamic Power Allocation and Routing for Time Varying Wireless Networks Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,

More information

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,, Bi Li a,b, Nicolas Nisse a, Hervé Rivano c, Min-Li Yu d a Coati Project, INRIA I3S(CNRS/UNSA), Sophia

More information

Private Information Retrieval from MDS Coded Databases with Colluding Servers under Several Variant Models

Private Information Retrieval from MDS Coded Databases with Colluding Servers under Several Variant Models 1 Private Information Retrieval from MDS Coded Databases with Colluding Servers under Several Variant Models Yiwei Zhang and Gennian Ge arxiv:170503186v2 [csit] 11 Oct 2017 Abstract Private information

More information

On Two Class-Constrained Versions of the Multiple Knapsack Problem

On Two Class-Constrained Versions of the Multiple Knapsack Problem On Two Class-Constrained Versions of the Multiple Knapsack Problem Hadas Shachnai Tami Tamir Department of Computer Science The Technion, Haifa 32000, Israel Abstract We study two variants of the classic

More information

Generalized Alignment Chain: Improved Converse Results for Index Coding

Generalized Alignment Chain: Improved Converse Results for Index Coding Generalized Alignent Chain: Iproved Converse Results for Index Coding Yucheng Liu and Parastoo Sadeghi Research School of Electrical, Energy and Materials Engineering Australian National University, Canberra,

More information

Privacy and Fault-Tolerance in Distributed Optimization. Nitin Vaidya University of Illinois at Urbana-Champaign

Privacy and Fault-Tolerance in Distributed Optimization. Nitin Vaidya University of Illinois at Urbana-Champaign Privacy and Fault-Tolerance in Distributed Optimization Nitin Vaidya University of Illinois at Urbana-Champaign Acknowledgements Shripad Gade Lili Su argmin x2x SX i=1 i f i (x) Applications g f i (x)

More information

The Power of Sparse and Low-Rank Optimization Paradigms for Network Densification

The Power of Sparse and Low-Rank Optimization Paradigms for Network Densification The Power of Sparse and Low-Rank Optimization Paradigms for Network Densification Yuanming Shi School of Information Science and Technology ShanghaiTech University 1 Outline Introduction Two Vignettes:

More information

Communicating the sum of sources in a 3-sources/3-terminals network

Communicating the sum of sources in a 3-sources/3-terminals network Communicating the sum of sources in a 3-sources/3-terminals network Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel Email: mikel@openu.ac.il Aditya Ramamoorthy

More information

Sparse Regression Codes for Multi-terminal Source and Channel Coding

Sparse Regression Codes for Multi-terminal Source and Channel Coding Sparse Regression Codes for Multi-terminal Source and Channel Coding Ramji Venkataramanan Yale University Sekhar Tatikonda Allerton 2012 1 / 20 Compression with Side-Information X Encoder Rate R Decoder

More information

Harnessing Interaction in Bursty Interference Networks

Harnessing Interaction in Bursty Interference Networks 215 IEEE Hong Kong-Taiwan Joint Workshop on Information Theory and Communications Harnessing Interaction in Bursty Interference Networks I-Hsiang Wang NIC Lab, NTU GICE 1/19, 215 Modern Wireless: Grand

More information

ON INDEX CODING WITH SIDE INFORMATION

ON INDEX CODING WITH SIDE INFORMATION ON INDEX CODING WITH SIDE INFORMATION DAU SON HOANG SCHOOL OF PHYSICAL & MATHEMATICAL SCIENCES 2012 ON INDEX CODING WITH SIDE INFORMATION DAU SON HOANG School of Physical & Mathematical Sciences A thesis

More information

Bounds on Shannon Capacity and Ramsey Numbers from Product of Graphs

Bounds on Shannon Capacity and Ramsey Numbers from Product of Graphs Bounds on Shannon Capacity and Ramsey Numbers from Product of Graphs Xiaodong Xu Guangxi Academy of Sciences Nanning, Guangxi 530007, China xxdmaths@sina.com and Stanis law P. Radziszowski Department of

More information

Staircase Codes for Secret Sharing with Optimal Communication and Read Overheads

Staircase Codes for Secret Sharing with Optimal Communication and Read Overheads 1 Staircase Codes for Secret Sharing with Optimal Communication and Read Overheads Rawad Bitar, Student Member, IEEE and Salim El Rouayheb, Member, IEEE Abstract We study the communication efficient secret

More information

Privacy of Numeric Queries Via Simple Value Perturbation. The Laplace Mechanism

Privacy of Numeric Queries Via Simple Value Perturbation. The Laplace Mechanism Privacy of Numeric Queries Via Simple Value Perturbation The Laplace Mechanism Differential Privacy A Basic Model Let X represent an abstract data universe and D be a multi-set of elements from X. i.e.

More information

Explicit MBR All-Symbol Locality Codes

Explicit MBR All-Symbol Locality Codes Explicit MBR All-Symbol Locality Codes Govinda M. Kamath, Natalia Silberstein, N. Prakash, Ankit S. Rawat, V. Lalitha, O. Ozan Koyluoglu, P. Vijay Kumar, and Sriram Vishwanath 1 Abstract arxiv:1302.0744v2

More information

Strong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach

Strong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach Strong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach Silas Fong (Joint work with Vincent Tan) Department of Electrical & Computer Engineering National University

More information

Canonical Problem Forms. Ryan Tibshirani Convex Optimization

Canonical Problem Forms. Ryan Tibshirani Convex Optimization Canonical Problem Forms Ryan Tibshirani Convex Optimization 10-725 Last time: optimization basics Optimization terology (e.g., criterion, constraints, feasible points, solutions) Properties and first-order

More information

Can Linear Minimum Storage Regenerating Codes be Universally Secure?

Can Linear Minimum Storage Regenerating Codes be Universally Secure? Can Linear Minimum Storage Regenerating Codes be Universally Secure? Sreechakra Goparaju University of California, San Diego La Jolla, CA, USA Email: sgoparaju@ucsd.edu Salim El Rouayheb Illinois Institute

More information

On Gaussian MIMO Broadcast Channels with Common and Private Messages

On Gaussian MIMO Broadcast Channels with Common and Private Messages On Gaussian MIMO Broadcast Channels with Common and Private Messages Ersen Ekrem Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 20742 ersen@umd.edu

More information

Exploiting Symmetry in Computing Polyhedral Bounds on Network Coding Rate Regions

Exploiting Symmetry in Computing Polyhedral Bounds on Network Coding Rate Regions Exploiting Symmetry in Computing Polyhedral Bounds on Network Coding Rate Regions Jayant Apte John Walsh Department of Electrical and Computer Engineering Drexel University, Philadelphia NetCod, 205 NSF

More information

Robust Network Codes for Unicast Connections: A Case Study

Robust Network Codes for Unicast Connections: A Case Study Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,

More information

Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel

Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel Ahmad Abu Al Haija ECE Department, McGill University, Montreal, QC, Canada Email: ahmad.abualhaija@mail.mcgill.ca

More information

ECS 120 Lesson 18 Decidable Problems, the Halting Problem

ECS 120 Lesson 18 Decidable Problems, the Halting Problem ECS 120 Lesson 18 Decidable Problems, the Halting Problem Oliver Kreylos Friday, May 11th, 2001 In the last lecture, we had a look at a problem that we claimed was not solvable by an algorithm the problem

More information

Chapter 1: Introduction to Probability Theory

Chapter 1: Introduction to Probability Theory ECE5: Stochastic Signals and Systems Fall 8 Lecture - September 6, 8 Prof. Salim El Rouayheb Scribe: Peiwen Tian, Lu Liu, Ghadir Ayache Chapter : Introduction to Probability Theory Axioms of Probability

More information

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying Ahmad Abu Al Haija, and Mai Vu, Department of Electrical and Computer Engineering McGill University Montreal, QC H3A A7 Emails: ahmadabualhaija@mailmcgillca,

More information

Instantly Decodable Network Codes for Real-Time Applications

Instantly Decodable Network Codes for Real-Time Applications Instantly Decodable Network Codes for Real-Time Applications Anh Le, Arash S. Tehrani +, Alexandros G. Dimakis, Athina Markopoulou {anh.le, athina}@uci.edu University of California, Irvine + arash.sabertehrani@usc.edu

More information

The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel

The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel Stefano Rini, Daniela Tuninetti, and Natasha Devroye Department

More information

Key words: Batch codes, error-correcting codes, computationally-private information retrieval, load balancing, distributed storage.

Key words: Batch codes, error-correcting codes, computationally-private information retrieval, load balancing, distributed storage. Linear Batch Codes Helger Lipmaa and Vitaly Skachek Abstract In an application, where a client wants to obtain many symbols from a large database, it is often desirable to balance the load. Batch codes

More information

Lexicographic products and the power of non-linear network coding

Lexicographic products and the power of non-linear network coding Lexicographic products and the power of non-linear network coding Anna Blasiak Robert Kleinberg Eyal Lubetzky Abstract We introduce a technique for establishing and amplifying gaps between parameters of

More information

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR 1 Stefano Rini, Daniela Tuninetti and Natasha Devroye srini2, danielat, devroye @ece.uic.edu University of Illinois at Chicago Abstract

More information

Hierarchies. 1. Lovasz-Schrijver (LS), LS+ 2. Sherali Adams 3. Lasserre 4. Mixed Hierarchy (recently used) Idea: P = conv(subset S of 0,1 n )

Hierarchies. 1. Lovasz-Schrijver (LS), LS+ 2. Sherali Adams 3. Lasserre 4. Mixed Hierarchy (recently used) Idea: P = conv(subset S of 0,1 n ) Hierarchies Today 1. Some more familiarity with Hierarchies 2. Examples of some basic upper and lower bounds 3. Survey of recent results (possible material for future talks) Hierarchies 1. Lovasz-Schrijver

More information

Report on PIR with Low Storage Overhead

Report on PIR with Low Storage Overhead Report on PIR with Low Storage Overhead Ehsan Ebrahimi Targhi University of Tartu December 15, 2015 Abstract Private information retrieval (PIR) protocol, introduced in 1995 by Chor, Goldreich, Kushilevitz

More information

Fundamental Limits on Latency in Small-Cell Caching Systems: An Information-Theoretic Analysis

Fundamental Limits on Latency in Small-Cell Caching Systems: An Information-Theoretic Analysis Fundamental Limits on Latency in Small-ell aching Systems: An Information-Theoretic Analysis Seyyed Mohammadreza Azimi, Osvaldo Simeone, and Ravi Tandon Abstract aching of popular multimedia content at

More information

On MBR codes with replication

On MBR codes with replication On MBR codes with replication M. Nikhil Krishnan and P. Vijay Kumar, Fellow, IEEE Department of Electrical Communication Engineering, Indian Institute of Science, Bangalore. Email: nikhilkrishnan.m@gmail.com,

More information

Networks and Matroids

Networks and Matroids Adaptive Signal Processing and Information Theory Research Group ECE Department, Drexel University June 1, 2012 Outline 1 Mappings and Definitions Source Mapping: S : V 2 µ, µ is message set. Message Assignment:

More information

Some Goodness Properties of LDA Lattices

Some Goodness Properties of LDA Lattices Some Goodness Properties of LDA Lattices Shashank Vatedka and Navin Kashyap {shashank,nkashyap}@eceiiscernetin Department of ECE Indian Institute of Science Bangalore, India Information Theory Workshop

More information