An Optimal Bloom Filter Replacement Based on Matrix Solving

We suggest a method for holding a dictionary data structure, which maps keys to values, in the spirit of Bloom Filters. The space requirements of the dictionary we suggest are much smaller than those of a hashtable. We allow storing n keys, each mapped to value which is a string of k bits. Our suggested method requires nk + o (n ) bits space to store the dictionary, and O (n ) time to produce the data structure, and allows answering a membership query in O (1) memory probes. The dictionary size does not depend on the size of the keys . However, reducing the space requirements of the data structure comes at a certain cost. Our dictionary has a small probability of a one sided error. When attempting to obtain the value for a key that is stored in the dictionary we always get the correct answer. However, when testing for membership of an element that is not stored in the dictionary, we may get an incorrect answer, and when requesting the value of such an element we may get a certain random value. Our method is based on solving equations in GF (2 k ) and using several hash functions. Another significant advantage of our suggested method is that we do not require using sophisticated hash functions. We only require pairwise independent hash functions. We also suggest a data structure that requires only nk bits space, has O (n 2) preprocessing time, and has a O (logn ) query time. However, this data structures requires a uniform hash functions. In order replace a Bloom Filter of n elements with an error proability of 2*** k , we require nk + o (n ) memory bits, O (1) query time, O (n ) preprocessing time, and only pairwise independent hash function. Even the most advanced previously known Bloom Filter would require nk + O (n ) space, and a uniform hash functions, so our method is significantly less space consuming especially when k is small. Our suggested dictionary can replace Bloom Filters, and has many applications. A few application examples are dictionaries for storing bad passwords, differential files in databases, Internet caching and distributed storage systems.

[1]  Kumar Chellapilla,et al.  Bloomier Filters: A second look , 2008, ESA.

[2]  Douglas H. Wiedemann Solving sparse linear equations over finite fields , 1986, IEEE Trans. Inf. Theory.

[3]  S. Srinivasa Rao,et al.  An optimal Bloom filter replacement , 2005, SODA '05.

[4]  Li Fan,et al.  Summary cache: a scalable wide-area web cache sharing protocol , 2000, TNET.

[5]  James K. Mullin,et al.  A second look at bloom filters , 1983, CACM.

[6]  Andrei Broder,et al.  Network Applications of Bloom Filters: A Survey , 2004, Internet Math..

[7]  Udi Manber,et al.  An Algorithm for Approximate Membership checking with Application to Password Security , 1994, Inf. Process. Lett..

[8]  James K. Mullin,et al.  A tale of three spelling checkers , 1990, Softw. Pract. Exp..

[9]  J. Ian Munro,et al.  Membership in Constant Time and Almost-Minimum Space , 1999, SIAM J. Comput..

[10]  G. Villard A study of Coppersmith's block Wiedemann algorithm using matrix polynomials , 1997 .

[11]  Bernard Chazelle,et al.  The Bloomier filter: an efficient data structure for static support lookup tables , 2004, SODA '04.

[12]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[13]  Michael Mitzenmacher,et al.  Compressed bloom filters , 2002, TNET.

[14]  Lee L. Gremillion Designing a Bloom filter for differential file access , 1982, CACM.

[15]  Martin Dietzfelbinger,et al.  Succinct Data Structures for Retrieval and Approximate Membership , 2008, ICALP.

[16]  Yossi Matias,et al.  Spectral bloom filters , 2003, SIGMOD '03.

[17]  M. Douglas,et al.  Development of a Spelling List , 1982 .

[18]  Eugene H. Spafford,et al.  OPUS: Preventing weak password choices , 1992, Comput. Secur..