Combination Networks With or Without Secrecy Constraints: The Impact of Caching Relays

被引:27
作者
Zewail, Ahmed A. [1 ]
Yener, Aylin [1 ]
机构
[1] Penn State Univ Univ Pk, Sch Elect Engn & Comp Sci, State Coll, PA 16802 USA
基金
美国国家科学基金会;
关键词
Combination networks with caching relays; coded caching; maximum distance separable (MDS) codes; secure delivery; secure caching; FUNDAMENTAL LIMITS;
D O I
10.1109/JSAC.2018.2844941
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper considers a two-hop network architecture known as a combination network, where a layer of relay nodes connects a server to a set of end users. In particular, a new model is investigated, where the intermediate relays employ caches in addition to the end users. First, a new centralized coded caching scheme is developed that utilizes maximum distance separable coding, jointly optimizes cache placement and delivery phase, and enables decomposing the combination network into a set virtual multicast sub-network. It is shown that if the sum of the memory of an end user and its connected relay nodes is sufficient to store the database, then the server can disengage in the delivery phase and all the end users' requests can be satisfied by the caches in the network. Lower bounds on the normalized delivery load using genie-aided cut-set arguments are presented along with second hop optimality. Next, recognizing the information security concerns of coded caching, this new model is studied under three different secrecy settings: 1) secure delivery where we require an external entity that must not gain any information about the database files by observing the transmitted signals over the network links; 2) secure caching, where we impose the constraint that end users must not be able to obtain any information about files that they did not request; and 3) both secure delivery and secure caching, simultaneously. We demonstrate how network topology affects the system performance under these secrecy requirements. Finally, we provide numerical results demonstrating the system performance in each of the settings considered.
引用
收藏
页码:1140 / 1152
页数:13
相关论文
共 30 条
[1]   The use of multicast delivery to provide a scalable and interactive video-on-demand service [J].
Almeroth, KC ;
Ammar, MH .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1996, 14 (06) :1110-1122
[2]  
[Anonymous], 2004, Error Control Coding
[3]  
Awan ZH, 2015, IEEE INT CONF COMM, P464, DOI 10.1109/ICCW.2015.7247223
[4]  
Baranyai Z., 1975, INFINITE FINITE SETS, V10, P91
[5]  
Blakley C., 1985, Advances in Cryptology, P242
[6]  
Chen Z., 2014, Fundamental limits of caching: Improved bounds for small buffer users
[7]  
Cramer R., 2015, SECURE MULTIPARTY CO
[8]  
Ji MY, 2015, IEEE INT WORK SIGN P, P695, DOI 10.1109/SPAWC.2015.7227127
[9]  
Ji MY, 2015, 2015 49TH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, P1269, DOI 10.1109/ACSSC.2015.7421346
[10]   Fundamental Limits of Caching in Wireless D2D Networks [J].
Ji, Mingyue ;
Caire, Giuseppe ;
Molisch, Andreas F. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (02) :849-869