Device-to-Device Secure Coded Caching

被引:27
作者
Zewail, Ahmed A. [1 ,2 ]
Yener, Aylin [3 ]
机构
[1] Penn State Univ, Dept Elect Engn, State Coll, PA 16802 USA
[2] Wireless R&D Qualcomm Inc, San Diego, CA 92121 USA
[3] Penn State Univ, Dept Elect Engn, University Pk, PA 16802 USA
基金
美国国家科学基金会;
关键词
Servers; Device-to-device communication; Cache memory; Databases; Upper bound; Cryptography; Load modeling; Device-to-device communications; coded caching; secure caching; secure delivery; secret sharing; FUNDAMENTAL LIMITS; COMMUNICATION; NETWORKS; DELIVERY;
D O I
10.1109/TIFS.2019.2940885
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper studies device to device (D2D) coded-caching with information theoretic security guarantees. A broadcast network consisting of a server, which has a library of files, and end users equipped with cache memories, is considered. Information theoretic security guarantees for confidentiality are imposed upon the files. The server populates the end user caches, after which D2D communications enable the delivery of the requested files. Accordingly, we require that a user must not have access to files it did not request, i.e., secure caching. First, a centralized coded caching scheme is provided by jointly optimizing the cache placement and delivery policies. Next, a decentralized coded caching scheme is developed that does not require the knowledge of the number of active users during the caching phase. Both schemes utilize non-perfect secret sharing and one-time pad keying, to guarantee secure caching. Furthermore, the proposed schemes provide secure delivery as a side benefit, i.e., any external entity which overhears the transmitted signals during the delivery phase cannot obtain any information about the database files. The proposed schemes provide the achievable upper bound on the minimum delivery sum rate. Lower bounds on the required transmission sum rate are also derived using cut-set arguments indicating the multiplicative gap between the lower and upper bounds. Numerical results indicate that the gap vanishes with increasing memory size. Overall, the work demonstrates the effectiveness of D2D communications in cache-aided systems even when confidentiality constraints are imposed at the participating nodes and against external eavesdroppers.
引用
收藏
页码:1513 / 1524
页数:12
相关论文
共 38 条
[1]   The use of multicast delivery to provide a scalable and interactive video-on-demand service [J].
Almeroth, KC ;
Ammar, MH .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1996, 14 (06) :1110-1122
[2]  
[Anonymous], 2006, Elements of information theory
[3]  
[Anonymous], ARXIV170906281
[4]  
[Anonymous], ARXIV150300265
[5]  
[Anonymous], 2010, ELECT COMMUN
[6]   A Survey on Device-to-Device Communication in Cellular Networks [J].
Asadi, Arash ;
Wang, Qing ;
Mancuso, Vincenzo .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04) :1801-1819
[7]  
Awan Z. H., 2018, 2018 15 INT S WIRELE, P1
[8]  
Awan ZH, 2015, IEEE INT CONF COMM, P464, DOI 10.1109/ICCW.2015.7247223
[9]  
Bidokhti S. S., 2017, ARXIV170208044
[10]  
Blakley G. R., 1984, ADV CRYPTOLOGY CRYPT, V196, P242, DOI DOI 10.1007/3-540-39568-7_20