
We introduce the problem of deceptive information retrieval (DIR), in which a user wishes to download a required file out of multiple independent files stored in a system of databases while deceiving the databases by making the databases’ predictions on the user-required file index incorrect with high probability. Conceptually, DIR is an extension of private information retrieval (PIR). In PIR, a user downloads a required file without revealing its index to any of the databases. The metric of deception is defined as the probability of error of databases’ prediction on the user-required file, minus the corresponding probability of error in PIR. The problem is defined on time-sensitive data that keep updating from time to time. In the proposed scheme, the user deceives the databases by sending real queries to download the required file at the time of the requirement and dummy queries at multiple distinct future time instances to manipulate the probabilities of sending each query for each file requirement, using which the databases’ make the predictions on the user-required file index. The proposed DIR scheme is based on a capacity achieving probabilistic PIR scheme, and achieves rates lower than the PIR capacity due to the additional downloads made to deceive the databases. When the required level of deception is zero, the proposed scheme achieves the PIR capacity.
Networking and Internet Architecture (cs.NI), Signal Processing (eess.SP), FOS: Computer and information sciences, Computer Science - Cryptography and Security, Science, Physics, QC1-999, Computer Science - Information Theory, Information Theory (cs.IT), Q, Astrophysics, Article, deception, QB460-466, Computer Science - Networking and Internet Architecture, FOS: Electrical engineering, electronic engineering, information engineering, information retrieval, Electrical Engineering and Systems Science - Signal Processing, probabilistic schemes, Cryptography and Security (cs.CR)
Networking and Internet Architecture (cs.NI), Signal Processing (eess.SP), FOS: Computer and information sciences, Computer Science - Cryptography and Security, Science, Physics, QC1-999, Computer Science - Information Theory, Information Theory (cs.IT), Q, Astrophysics, Article, deception, QB460-466, Computer Science - Networking and Internet Architecture, FOS: Electrical engineering, electronic engineering, information engineering, information retrieval, Electrical Engineering and Systems Science - Signal Processing, probabilistic schemes, Cryptography and Security (cs.CR)
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 1 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
