A Privacy Attack on Coded Caching by Colluding Users

被引:0
作者
Wang, Yu [1 ]
Abouzeid, Alhussein A. [1 ]
机构
[1] Rensselaer Polytech Inst, Dept Elect Comp & Syst Engn, Troy, NY 12180 USA
基金
美国国家科学基金会;
关键词
Coded caching; privacy; attack; FUNDAMENTAL LIMITS;
D O I
10.1109/LCOMM.2021.3110941
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Coded caching is beneficial due to its ability to leverage the multicast property of a wireless channel. Under specific network settings, the coded caching scheme has been shown to reveal the user file requests. In prior work, a privacy attack by a single attacker on coded caching was presented. In this letter, we focus on a relatively secure setting whereby only the intended users access the files. Nevertheless, we show that, even in this setting, privacy is compromised if the users are colluding. The time complexity of the attack on a network with N files, K users, and l <= K colluding users is shown to be in the order of root ln(N(K - l))N(K- l)/2 steps.
引用
收藏
页码:3488 / 3492
页数:5
相关论文
共 17 条
[1]  
Aravind V. R, 2020, 2020 NATL C COMMUNIC, P1
[2]  
Breslau L, 1999, IEEE INFOCOM SER, P126, DOI 10.1109/INFCOM.1999.749260
[3]  
Golrezaei N, 2012, IEEE INT SYMP INFO
[4]  
Ibrahim A.M., 2017, PROC 2017 IEEE WIREL, P1, DOI [10.1109/WCNC. 2017.7925535, DOI 10.1109/WCNC.2017.7925535]
[5]   PREPROCESSING-FREE SURFACE MATERIAL CLASSIFICATION USING CONVOLUTIONAL NEURAL NETWORKS PRETRAINED BY SPARSE AUTOENCODER [J].
Ji, M. Q. ;
Fang, Lu ;
Zheng, Haitian ;
Strese, Matti ;
Steinbach, Eckehard .
2015 IEEE INTERNATIONAL WORKSHOP ON MACHINE LEARNING FOR SIGNAL PROCESSING, 2015,
[6]   Fundamental Limits of Caching in Wireless D2D Networks [J].
Ji, Mingyue ;
Caire, Giuseppe ;
Molisch, Andreas F. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (02) :849-869
[7]  
Kamath S., 2019, ARXIV190903324
[8]   Decentralized Coded Caching Attains Order-Optimal Memory-Rate Tradeoff [J].
Maddah-Ali, Mohammad Ali ;
Niesen, Urs .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2015, 23 (04) :1029-1040
[9]   Fundamental Limits of Caching [J].
Maddah-Ali, Mohammad Ali ;
Niesen, Urs .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (05) :2856-2867
[10]   Private Coded Caching [J].
Ravindrakumar, Vaishakh ;
Panda, Parthasarathi ;
Karamchandani, Nikhil ;
Prabhakaran, Vinod M. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (03) :685-694