Publications

Detailed Information

Coding Techniques for Communication, Storage, and Computation in Distributed Networks : 분산 네트워크에서 통신, 저장, 계산을 위한 부호화 기법

DC Field Value Language
dc.contributor.advisor이정우-
dc.contributor.author양희철-
dc.date.accessioned2018-05-28T16:21:01Z-
dc.date.available2018-05-28T16:21:01Z-
dc.date.issued2018-02-
dc.identifier.other000000149644-
dc.identifier.urihttps://hdl.handle.net/10371/140670-
dc.description학위논문 (박사)-- 서울대학교 대학원 : 공과대학 전기·컴퓨터공학부, 2018. 2. 이정우.-
dc.description.abstractAs the demand for communication, storage, and computation of large data in a network consisting of massive devices increases, there has been a growing interest in designing distributed networks. This is mainly because existing centralized networks are not able to meet the requirements (e.g. low latency, massive connectivity) of increasing data and large number of nodes for emerging Internet of Things (IoT). In this dissertation, I propose distributed architectures for communication, storage, and computation of large data in a network focusing on scalability and security, which are one of the most important issues in the configuration of distributed networks. To support this, I analyze the performance of distributed networks in an information-theoretic sense, and demonstrate that the proposed architectures show the near-optimal performances on processing communication, storage, and computation of large data in a distributed network.

To begin with, I discuss the problem of interference management in distributed networks. Specifically, I focus on a blind interference alignment (IA) technique that exploits a reconfigurable antenna at the receiver sides, which does not require global channel state information at the transmitter sides. This technique can give the scalability of the network by reducing feedback overhead of channel state information in large-scale interference networks. I propose blind IA schemes for fully-connected and partially-connected interference networks, and derive the information-theoretic upper-bounds on the degrees-of-freedom (DoF) of the networks. I also consider a practical channel assumption that the coherence time of the channel is not long enough to perform a blind IA technique.

Secondly, I consider user's privacy and data security for information retrieval in distributed storage systems. I propose two secure distributed storage systems and their private information retrieval (PIR) schemes that keep user's privacy (concealing the index of the desired message) from each of the databases and preserve data security from an eavesdropper who can access to one of the databases or link between the database and the user to obtain information about messages. Moreover, It is shown that the PIR rates of the proposed schemes are within a constant multiplicative factor from the derived upper bound on the capacity of the PIR problem.

Lastly, I address a secure distributed computing problem in which a master wants to perform computation tasks (e.g. matrix multiplication, vector convolution) on confidential data with non-colluding workers in parallel, while not revealing information about confidential data to workers in an information-theoretic sense. To enhance the scalability of distributed computing networks, I provide a distributed computing scheme using polynomial codes that can efficiently cope with straggling effects. I demonstrate the performance of the proposed scheme on recovery threshold by showing that the achievable recovery threshold is within a constant multiplicative factor from the upper bound.
-
dc.description.tableofcontents1. Introduction 1
1.1 Background: Distributed Networks 1
1.1.1 Interference Management in Distributed Networks 2
1.1.2 Privacy and Security in Distributed Storage Systems 3
1.1.3 Security in Distributed Computing with Stragglers 5
1.2 Contributions and Organization 6
1.3 Notation 8

2. Blind Interference Alignment for Interference Networks 9
2.1 Introduction 9
2.2 System Model 12
2.3 Blind IA for Fully-Connected K-user Interference Channel 13
2.3.1 SISO Interference Channel 14
2.3.2 MISO Interference Channel 22
2.3.3 Extension to Cellular Networks 45
2.4 Blind IA for Partially-Connected K-user Interference Channel 48
2.4.1 Partially Connected Model 49
2.4.2 Alignment & Conflict Graphs 50
2.4.3 Half-Rate Feasible Topologies 51
2.4.4 Upper-Bounds on Linear Symmetric DoF 56
2.4.5 Achievable Scheme 65
2.4.6 Numerical Analysis 73
2.5. Blind IA with Finite Coherence Time 81
2.5.1 System Model 82
2.5.2 Hierarchical Blind IA 85
2.5.3 Dynamic Supersymbol Design 103
2.5.4 Achievable Rate 107
2.5.5 Numerical Analysis 110
2.6 Conclusion 116

3. Private Information Retrieval for Secure Distributed Storage Systems 119
3.1 Introduction 120
3.2 System Model 122
3.3 Databases without Coordination 125
3.3.1 Algorithm 126
3.3.2 PIR capacity 131
3.4 Databases with Coordination 134
3.4.1 Algorithm 135
3.4.2 PIR capacity 140
3.5 Discussion 143
3.5.1 Size of Databases 143
3.5.2 Improved Lower-Bound 145
3.6 Conclusion 148

4. Secure Distributed Computing using Polynomial Codes 149
4.1 Introduction 150
4.2 System Model 153
4.3 Distributed Matrix Multiplication 155
4.3.1 Achievable Scheme 155
4.3.2 Analysis on Recovery Threshold 160
4.4 Extension to Distributed Convolution 166
4.4.1 Achievable Scheme 166
4.4.2 Analysis on Recovery Threshold 169
4.5 Numerical Analysis 171
4.6 Conclusion 176

5. Conclusion 177
5.1 Summary 177
5.2 Future Directions 179
-
dc.formatapplication/pdf-
dc.format.extent7715023 bytes-
dc.format.mediumapplication/pdf-
dc.language.isoen-
dc.publisher서울대학교 대학원-
dc.subjectInterference management-
dc.subjectPrivate information retrieval-
dc.subjectDistributed computing-
dc.subjectInformation theory-
dc.subjectSecurity-
dc.subject.ddc621.3-
dc.titleCoding Techniques for Communication, Storage, and Computation in Distributed Networks-
dc.title.alternative분산 네트워크에서 통신, 저장, 계산을 위한 부호화 기법-
dc.typeThesis-
dc.description.degreeDoctor-
dc.contributor.affiliation공과대학 전기·컴퓨터공학부-
dc.date.awarded2018-02-
Appears in Collections:
Files in This Item:

Altmetrics

Item View & Download Count

  • mendeley

Items in S-Space are protected by copyright, with all rights reserved, unless otherwise indicated.

Share