Papers by Mohit Shrivastava
arXiv (Cornell University), Mar 17, 2021
In this paper we study the problem of private information retrieval where a user seeks to retriev... more In this paper we study the problem of private information retrieval where a user seeks to retrieve one of the F files from a cluster of N non-colluding servers without revealing the identity of the requested file. In our setting the servers are storage constrained in that they can only store a fraction µ = t/N of each file. Furthermore, we assume that the files are stored in an uncoded fashion. The rate of a PIR protocol is defined as the ratio of the file size and the total number of bits downloaded. The maximum achievable rate is referred to as capacity. It was previously shown that there are capacity achieving PIR protocols when the file size is N F and complete files were stored on all the servers. These results were further extended for the case when servers store only a fraction of each file. However, the subpacketization v of the files required is exponential in the number of servers N. We propose a novel uncoded PIR protocol based on combinatorial designs that are also capacity achieving when the file size is v × t F. Our protocol has linear subpacketization in the number of servers in contrast to previous work in storage constrained uncoded PIR schemes. In the proposed PIR protocol, the given system is projected to multiple instances of reduced systems with replicated servers having full storage capacity. The subfiles stored in these various instances are separately retrieved and lifted to solve the PIR problem for the original system.
arXiv (Cornell University), Mar 17, 2021
In this paper we study the problem of private information retrieval where a user seeks to retriev... more In this paper we study the problem of private information retrieval where a user seeks to retrieve one of the F files from a cluster of N non-colluding servers without revealing the identity of the requested file. In our setting the servers are storage constrained in that they can only store a fraction µ = t/N of each file. Furthermore, we assume that the files are stored in an uncoded fashion. The rate of a PIR protocol is defined as the ratio of the file size and the total number of bits downloaded. The maximum achievable rate is referred to as capacity. It was previously shown that there are capacity achieving PIR protocols when the file size is N F and complete files were stored on all the servers. These results were further extended for the case when servers store only a fraction of each file. However, the subpacketization v of the files required is exponential in the number of servers N. We propose a novel uncoded PIR protocol based on combinatorial designs that are also capacity achieving when the file size is v × t F. Our protocol has linear subpacketization in the number of servers in contrast to previous work in storage constrained uncoded PIR schemes. In the proposed PIR protocol, the given system is projected to multiple instances of reduced systems with replicated servers having full storage capacity. The subfiles stored in these various instances are separately retrieved and lifted to solve the PIR problem for the original system.
Journal of Indian Academy of Forensic Medicine, 2021
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2021
Lung Cancer is the most commonly occurring type of cancer in the world. Despite all the research ... more Lung Cancer is the most commonly occurring type of cancer in the world. Despite all the research in the field of lung cancer is still maintains a extremely high mortality rate and a cure rate of of less than 15%. Majority of lung cancer patients are diagnosed at a very advanced stage which is why randomized clinical trials have come under intense scrutiny from the medical practitioners and have led to a new resurgence of interest in its screening methods and development of newer techniques to improve its efficiency. The existing screening and detection techniques have known to be slow, cost ineffective and have other discrepancies such as false positives. Keeping this in mind we propose to use ensemble learning methods to train our data-set to overcome the drawbacks and improve upon the individual algorithms.
Voice over Internet telephony (VoIP) is extremely pervasive today. Its cheap availability and eas... more Voice over Internet telephony (VoIP) is extremely pervasive today. Its cheap availability and ease of setup has made the serial harassers, criminals and even terrorists to use it for illegal activities. This makes VoIP subject to surveillance by Law Enforcement Agencies (LEAs). It has been observed that governments, in the solemn interest of national security, request companies like Skype, Google and others to hand over content of communications between suspected criminals. Seeing a business opportunity, the companies charge exorbitantly for retrieval thus costing the exchequer. Unlike any mechanisms of lawful interception which allow for an asymmetric and unsustainable monopoly, this paper proposes hidden placement of hardware network analyzers to perform deep packet inspection for network traffic payloads and intercepting them before they reach the voice service provider by performing packet classification in constant time using a Frame Check Sequence based classification techniq...
Perspectives in Science, 2016
Cloud computing is a hot technology in the market. It permits user to use all IT resources as com... more Cloud computing is a hot technology in the market. It permits user to use all IT resources as computing services on the basis of pay per use manner and access the applications remotely. Infrastructure as a service (IaaS) is the basic requirement for all delivery models. Infrastructure as a service delivers all possible it resources (Network Components, Operating System, etc.) as a service to users. From both users and providers point of view: integrity, privacy and other security issues in IaaS are the important concern. In this paper we studied in detail about the different types of security related issues in IaaS layer and methods to resolve them to maximize the performance and to maintain the highest level of security in IaaS.
2015 IEEE International Advance Computing Conference (IACC), 2015
SQL Injection (SQLI) is a quotidian phenomenon in the field of network security. It is a potent a... more SQL Injection (SQLI) is a quotidian phenomenon in the field of network security. It is a potent and effective way of intruding into secured databases thereby jeopardizing the confidentiality, integrity and availability of information in them. SQL Injection works by inserting malicious queries into legal queries thereby rendering it increasingly arduous for most detection systems to be able to discern its occurrence. Hence, the need of the hour is to build a coherent and a smart SQL Injection detection system to make web applications safer and thus, more reliable. Unlike a great majority of current detection tools and systems that are deployed at a region between the web server and the database server, the proposed system is deployed between client and the web server, thereby shielding the web server from the inimical impacts of the attack. This approach is nascent and efficient in terms of detection, ranking and notification of the attack designed using pattern matching algorithm based on the concept of hashing.
Uploads
Papers by Mohit Shrivastava